:: Home
:: News
:: Downloads
:: Tutorials
:: E-Books
:: Tips And Tricks
:: Phreaking
:: Software
:: Windows
:: Linux



:: Exploits
:: 
MSN
:: Products
:: Most Wanted
:: Site News
:: About Us
:: Contact Us
:: GuestBook
:: Links



Link us?

Link us?

Link us?




Top Viruses
1.  WORM_NYXEM.E
2.  SPYW_DASHBAR.300
3.  SPYW_GATOR.F
4.  HTML_NETSKY.P
5.  WORM_NETSKY.P
 
Virus Advisories
•  TROJ_MULDROP.GP 
•  WORM_ATOMICKS.A 
•  BKDR_DUMADOR.BW 
•  TROJ_DLOADER.CBC 
•  ELF_MARE.J 
•  more...
 
Virus Search  
Webmasters: add virus info to your site



Hits:
Tutorials:
Downloads:

web page hit counter
                                                        



  • XXX BlackNET
  • Cracking
  • ACK Tunneling Trojans - Any firewall between the attacker and the victim that blocks incoming traffic will usually stop all trojans from working. ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall you'll be safe from that. This paper describes another concept, that I call ACK Tunneling. (19132 hits)
    AckCmd - AckCmd is a special kind of remote Command Prompt for Windows 2000. It communicates using only TCP ACK segments. This way the client component is able to directly contact the server component through a firewall in some cases. (26489 hits)
    AntiCracking - Software about how to try stop crackers. Protection - security programs. (4463 hits)
    Crack For WinCrypt - (11857 hits)
    crackXL - crackXL is a utility to recover passwords in Microsoft Excel. (89 hits)
    cRARk v. 1.5 - RAR password cracker. (37954 hits)
    cRARk v. 2.0 - RAR password cracker. (115793 hits)
    EUDPASS - Eudora Pro/Lite Password Decoder. (35141 hits)
    French Reverse Engineering Team (FRET) - Papers, code , challenges about reverse engineering under Windows and Unix. Forum (737 hits)
    hack office 2000 0.1.8.1 - similar to goldeneye and wwwhack. nice features such as adult check generator, leecher, and various cracking methods (336458 hits)
    How To Crack - A guide by Orc+. (22946 hits)
    John Ripper 1.5 - DOS Version. (9483 hits)
    John The Ripper - Official Website (current version: v1.6) - "John the Ripper is a password cracker, currently available for UNIX, DOS, Win32. Its primary purpose is to detect weak UNIX passwords." (38426 hits)
    killer cracker 9.5 - decent DOS based cracker (6927 hits)
    MD5 Cracker - windows port (11726 hits)
    MS Lanman Extract 2 - version 2 of QX-Mat's Lanman share extracting tool (23449 hits)
    NetMole - a new web cracker that has features many other big-time crackers are lacking. supports 999 bots, can be left alone without screwing up, advanced password leaching spider... (76045 hits)
    Password crackers - A website with alot of password-crackers, exploits and viruses. (4359 hits)
    tetro ftp cracker - good ftp cracker (25357 hits)
    The Hackology Network - the makers of own tools, like HDKP (Hard Drive Kller Pro), Munga Bunga's HTTP Brute Forcer (for hacking hotmail and many others) and Black Angel 2000 (71905 hits)
    Trumpet Winsock Cracker - Trumpet Winsock v3.0+ ID/PW cracker (9784 hits)
    velocity cracking utils - allows you to run several big-name dos crackers visually (10333 hits)
    VNCrack, the VNC cracker - Brute force cracking. (16410 hits)
    Word97 / Excel 97 cr 0.0.0.3 - Word password 97/8.0 & Excel password 97/8.0 cracker (177084 hits)
    WPCrack - Word Perfect 4.x and 5.x Password Cracker (8587 hits)
    www.Kryptocrew.de - german Tutorials page about hacking, cracking, 
  • phreaking, virii, trojans and security related stuff (26852 hits)
  • Zor's News - crack scene news (55297 hits)
  • Hacking Challenges
  • Area 6 - Hacking challanges. (43266 hits)
    Blind-Dice - Internet challenge and security site. 45 challenges now up, in 9 sections. (3474 hits)
    Bright Shadows Challenges - TheBlackSheep and Erik from Germany created one of the most robust Hacker Challenge sites. (1700 hits)
    Cryptoanalysis Challenges - Every year tehere is the competition in cryptoanalysis. You have to break secure messages and you can win prizes. (Czech only) (565 hits)
    Encryption Challenge - Encrypt the coded message given in red characters at the bottom of the index page. (2058 hits)
    FATE - Downloadable hacking challenge that features a cool story line and realistic hacking missions. Also 40 training/tutorials available on everything from basic unix exploits to lock picking. (5105 hits)
    Hack This Site - Great site with encryption and SQL challenges. (2635 hits)
    hackergames.net - Lots of links to other hacking challenges! (19897 hits)
    Hackits - 2 Challenges with 8 and 9 Levels, Ranking, Avatar and Scoresystem. (2178 hits)
    HackQuest - a nice hack challenge for beginners and intermediates. Try your skills without getting thrown in jail. (15964 hits)
    HellBoundHackers - Masses of Hacking Challenges in different Sections. JavaScript, Basic & Realistic Hacking, Cracking,Rooting (211 hits)
    IHackedThisBox.com Hacker Challenges - You will be able to participate in a series of online internet security challenges designed to test your skills in various fields of security. IHackedThisBox hacker/security challenges are always under construction, and is updated frequently (337 hits)
    Learn To Hack - This site consists of hacking challenges (wargames), and crypto challenges. A forum is available for hints/help. (15415 hits)
    Pulltheplug.org - Has wargames of diffrent levels to challenge you. (574 hits)
    The CrackMe Site - It Conatins Large Volume Of CrackMes. Crackmes are the programs created by crackers to test skills of fellow crackers. (83 hits)
    Try2Hack - A basic security challange. (8808 hits)
    TT0 hack challenges - Pretty new site with interesting challenges. Some are very easy but some can take days for You to break :) (1176 hits)
    Uplink. High tech computer crime and industrial espionage on the Internet of 2010. - You play an Uplink Agent who makes a living by performing jobs for major corporations. Your tasks involve hacking into rival computer systems, stealing research data, sabotaging other companies, laundering money, erasing evidence, or framing innocent people. You use the money you earn to upgrade your computer systems, and to buy new software and tools. As your experience level increases you find more dangerous and profitable missions become available. You can speculate on a fully working stock market (and even influence its outcome). You can modify peoples academic or criminal records. You can divert money from bank transfers into your own accounts. You can even take part in the construction of the most deadly computer virus ever designed. (195 hits)
    War Industries - Hacking challenges and some tutorials. (4082 hits)
  • Security
  • AntiCracking - Software protection development, testing, enhancement. SVK-Protector, Token-Lock - most powerful tools offering both software developers and distributors a protection of software products against unauthorized copying, use and distribution. (947 hits)
    Black List Software - Download freeware (Kr4ck3r, Sekritz, Contek), Join the forum (Security, Programming, Forensics), Join the High Society (HS privs), Ethical Hacking, Black List Software, Tracking, Cracking, Auditing, War Driving, Dumpster Diving, Social Engineering, VB, C, ASM, PHP, Inline ASM, Shellcode, Retail, Shop, FTM, Mock IT Cert Exams, A+, Net+, CCNE, suggest an exam, Code Snippets, Quick Mods, Hardware Interfacing, Tech Support, professional design. (581 hits)
    Browser Fun Browser bugs, tricks, and hacks. - This blog will serve as a dumping ground for browser-based security research and vulnerability disclosure. To kick off this blog, we are announcing the Month of Browser Bugs (MoBB), where we will publish a new browser hack, every day, for the entire month of July. The hacks we publish are carefully chosen to demonstrate a concept without disclosing a direct path to remote code execution. Enjoy! (34 hits)
    Carl Lorentzen - 100% hardware proximity security access device for all desktop computers. (1594 hits)
    CERT® Coordination Center Home Network Security - This document gives home users an overview of the security risks and countermeasures associated with Internet connectivity, especially in the context of “always-on” or broadband access services (such as cable modems and DSL). However, much of the content is also relevant to traditional dial-up users (users who connect to the Internet using a modem). (28 hits)
    CHAOS Universal - CHAOS Universal hides secret information in sound, image, and text files (BMP, WAV, TXT, HTML). This sensitive data is being encrypted beforehand. That way files can be sent over the Internet without being discovered by a third party. (166 hits)
    COAST Security Archive - This archive contains several thousand tools and documents in all aspects of security. (17368 hits)
    Crewl Underground Madness - belgian hacking group specialized in network (in)security, coding and phreaking - projects, tools, downloads etc. (6853 hits)
    Cyber Warfare - forum/tutorials related to computer security (281 hits)
    DisCard - Online carding tool: fake Credit Card numbers generator and verifier with several credit cards from over 170 banks worldwide, or create your own pattern. no cvv, cvc, cin, pin. (167620 hits)
    EndMedia - Your underground media sphere. editorials, commentary, hacking, security, tools and more (1178 hits)
    Enslaver Unix Security Group - Enslaver Unix Security Group. (6071 hits)
    Enterprise Security World - commercial security solutions (1022 hits)
    Firewall and Security - A community about firewall , network and security themes. (1845 hits)
    Flamecruiser - (4787 hits)
    Free online NMAP Portscanner, scans all 65535 Ports (German) - You can scan you ports here online using Nmap on a website. Free. (290 hits)
    Free online web based nessus and nmap scans - (5023 hits)
    Getting geographical Information using an IP Address - (3149 hits)
    HackersLab - Wanna learn how to hack Linux box? (2500 hits)
    hacking.de - german site of security, information, community (2062 hits)
    Hideaway.net - security portal (5985 hits)
    Internet Storm Center (ISC) - he ISC was created in 2001 following the successful detection, analysis, and widespread warning of the Li0n worm. Today, the ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. (35 hits)
    invulnerableit.com - An open informational community for IT enthusiasts to access resources and interact with one another about the most crucial aspect of the field today: security. (209 hits)
    iSecureLabs.com - french security related news portal (1326 hits)
    ISO 17799 (ISO17799) Software Directory - Directory of software for ISO 17799 (ISO17799) compliance and security risk analysis (1166 hits)
    ISO 17799 Newsletter - Established, subscription free, newsletter dedicated to the ISO 17799 security standard. (256 hits)
    Keylogger.org - Independent testing, rating and review of spy software, keyloggers and monitoring software - Which keylogger is the best? How to create your own keylogger? Want to know more? Welcome to Keylogger.org - independent testing, rating and review of spy software, keyloggers and monitoring software. News, articles, press-releases, live chat, forum - all about monitoring software. (511 hits)
    ko-2 - Security, encryption, authenticate, secure access, file integrity, exposure, vulnerability, biometrics services. (924 hits)
    Learn Security Online - Formerly RootWars.org - a website purely focused on hacking competitions is now back after a complete make-over as LearnSecurityOnline.com using simulators, security games, and challenge servers to teach computer security. (341 hits)
    libsafe - The libsafe library protects a process against the exploitation of buffer overflow vulnerabilities in process stacks. (1162 hits)
    neproot research - A Nepali site dedicated to teach newbies about hackers and hacking. (3541 hits)
    Network Security Solutions (India) Ltd. - NSS provides information security programs and technical investigative solutions for corporate and government clients. (854 hits)
    Network Security Toolkit - Welcome to the Network Security Toolkit (NST). This bootable ISO live CD is based on Fedora Core 4. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86 platforms. (203 hits)
    NSA Security Guidelines - Security guidelines of the US National Security Agency. (8866 hits)
    packet knights crew - tools, exploits and advisories of packet knights crew (4562 hits)
    Rediff On The NeT - Saving private data - A computer security primer for technology greenhorns. (4248 hits)
    SANS Institute - a cooperative education & research organisation for those who manage secure systems and networks (3458 hits)
    Scamerica.org - Scamerica.org is an informational site dedicated to helping fight the rise in online fraud and Phishing, marketing scams, Spyware and identity theft. This is a user contributed site, where you, the user, can post information about new scams/threats, participate in discussions, and help others avoid the pitfalls perpetuated by ruthless crime syndicates worldwide. (39 hits)
    Secure Commerce Services - (877 hits)
    SecureRoot Underground Search - Web directory dedicated to computer security and internet underground. (1037 hits)
    SecureStandard - Our Network is Your Security - Directory of free information security articles, white papers, and documents to assist security professionals. (312 hits)
    security friday - the own security checking tools (3752 hits)
    Security Horizon - Updated news on the security world, tools, and docs. (3938 hits)
    Security Pipeline - Security News (713 hits)
    Security, Exploits, Forums, All Operating System, - For all windows and Linux Systems security solutions and vulnerabilities developing center. (292 hits)
    SMS Spoofing Tool - SMS spoof is an application that allows you to send spoofed SMS messages with a palm pilot. (8654 hits)
    Sprint - Sprint is an OS fingerprinting tool which is similar to Queso except that it is written in Perl and is still actively being developed. (1710 hits)
    Surasoft.com - security links (3772 hits)
    Sysinternals - Rootkit Revealer - advanced patent-pending root kit detection utility :) (186 hits)
    taoo security - codes, text files, security tutorials, proof of concepts codes, manuals (762 hits)
    team2600.com - MAC security, hacking & tools (18101 hits)
    The importance of bug testing - editorial by dethy / synnergy (1464 hits)
    Tripwire - semi-commercial NIDS (1581 hits)
    Try2Hack - very simple hacking challenges (36812 hits)
    War Industries - One of the biggest online hpvca archive, books, tutorials, programs, everything you need. (1676 hits)
    Wireless Network Security 802.11, Bluetooth and Handheld Devices - Wireless technologies have become increasingly popular in our everyday business and personal lives. Personal digital assistants (PDA) allow individuals to access calendars, e-mail, address and phone number lists, and the Internet. Some technologies even offer global positioning system (GPS) capabilities that can pinpoint the location of the device anywhere in the world. Wireless technologies promise to offer even more features and functions in the next few years. (41 hits)

        | Home |      | Free Mail |      | Forum |      | Contact Us |      | Banners |            | Links |    | E-mail |
 

Poll Box
Vi koristite?

Windows
Linux
Mac/PPC
FreeBSD
SunOS
ostalo...

view results

 
Top Downloads
1.  BlackNet IRC Script
2.  Super Scan 4
3.  NT Unix Crack
4.  Hack Office
5.  Hack C. Card

 

Content Copyright 2005 BlackNET. Layout created by [YP]