Click on category name or software name. Some software requires WinZip to install. For IE users, hit Ctrl-F to search. Some programs must be unzipped into a folder before installation. It's highly recommended to view the text documents by Editplus.
Exploit and vulnerability
2. Exploits from hoobie.net
Here is an aging, but still very relevant collection of security exploits for various operating systems.
Type: Free
3. Exploits from s0ftpj.org
The tools were created in order to improve security and privacy.
Type: Free
4. Exploits from w00w00.org
W00w00, with 30 active members, is currently the largest non-profit security team in the world. w00w00 was created over three years ago. We have members in 5 continents, and 11 countries (Australia, Argentina, Canada, Japan, France, Russia, England, Spain, Sweden, Germany, USA), and 14 U.S. states. The members are diverse in their abilities, location, and ethnicity. The team continues to grow because we accept those with strong capabilities and talents. Once someone becomes involved, they usually stay involved. Once a w00, always a w00.
Type: Free
5. Exploits from Teso.org
Teso is an international group of young and motivated computer programmers and security enthusiasts. With more than one dozen members specialized in the network security field we do spend a lot of time in research and development of new vulnerabilities and exploitation tools that are useful to both 'hackers' and security professionals.
Type: Free
E-zine
Hacker culture
2. Hacker Pictures & Photos
Pictures of people who have made a mark in any
of the following: programmable computer systems,
computer networks, the Internet or the security
involved with those systems.
Type: Free
3. Jargon
This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor.
Type: Free
From: http://www.tuxedo.org/~esr/jargon/
Hacking tool
2. DoS
Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks. But, like viruses, new DoS attacks are constantly being dreamed up by hackers.
Type: Freeware
3. Encryption
Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.
Type: Freeware
4. Firewall
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Type: Freeware
5. IDS
An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.
Type: Freeware
6. Integrity detection
Integrity detection software is a policy driven file system integrity checking tool that allows system administrators to verify the integrity of their data.
Type: Freeware
7. Miscellaneous
Other helpful tools to hackers.
Type: Freeware
8. Network tool
These network tools are very useful for hacking.
Type: Freeware
9. Password cracking
A password cracker is any program that can decrypt passwords or otherwise disable password protection. A password cracker need not decrypt anything. In fact, most of them don't. Real encrypted passwords, as you will shortly learn, cannot be reverse-decrypted.
Type: Freeware
10. Scanner
A security scanner is a software which will audit remotely a given network and determine whether bad guys may break into it, or misuse it in some way.
Type: Freeware
11. Sniffer
Sniffers can be used both for legitimate network management functions and for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal.
Type: Freeware
Security archive
Tutorial
2. Linux HOWTO
Linux HOWTOs are documents which describe in detaila certain aspect of configuring or using Linux.
Type: Free
From: http://www.tldp.org