Hacking files

COW-02.ZIP C.O.W, (coveneant of wrym),#2 Hacker attack chills entire computer world
COW-03.ZIP C.O.W, (coveneant of wrym),#3
FAQ.ZIP Frequently asked questions about hacking novell netware "the unofficial netware hack faq" beta version 3
GETOPT.ZIP L0pht Security Advisory
HACK122.ZIP The Hack Report
HOWHACK.ZIP How to crack, by +orc, a tutorial
KABOOM_3.ZIP KaBoom! v3.0, *the* mail bomber for Windows 3.x and Win95.
KEYBSCAN.ZIP Scan! Is a RAM-resident program that uses about 5K of memory. It "scans" the keyboard all the time, and registers what keys are being pressed. These keys are then stored into the RAM. DUMP.COM is is a program that can acces the storage memory used by KEYBSCAN.COM, convert the information into ASCII characters and write this information to a file named DUMP.DAT. So DUMP.DAT will contain everything you typed from the moment you loaded KEYBSCAN.COM.
KRB_AD_1.ZIP L0pht Security Advisory
L0PHTC_1.ZIP L0pht Security Advisory
L0PHTC81.ZIP L0pht Security Advisory
LOD.ZIP The LOD/H Technical Journal
MODSTAT.ZIP L0pht Security Advisory
NW3XMAIL.ZIP L0pht Security Advisory
RA.ZIP Why the "Fun with RA boards" hacking method is LAME! (The REAL way to hack RemoteAccess)
SENDMA_1.ZIP L0pht Security Advisory
SKEY_P_1.ZIP L0pht report monkey - the s/key cracker
TEST-C_1.ZIP L0pht Report
TTP-2.ZIP The Thrashing Pirana, file #2
VANDOORN.ZIP Computer break-ins: a case study
VB9603.ZIP Sun microsystems security bulletin

Cracking files

GTOOLS.ZIP Gametools v3.00 This is a TSR utility for cracking software protection such as disk protection, password protection and registration screens. It can also be used to modify the games so that they can be much easier finished. It includes an colorful internal debugger and ram viewer for program debugging. This program requires users to have some knowledge of IBM PC assembly language and interrupts handling.

Hacking wordlists