Make your own free website on Tripod.com
Enter Jack's UnderGround here!














The Hackers handbo Information on firewalls The Hacker's Dictionary (big) The Pirate's Friend Starthack.txt: An intro to Hacking The Hacker's Prayer A list of some Unix BBS's out there HackIRC.txt Hacking Servers 101 How to Find Security Holes Concepts in finding security breaches, mainly in software code. Social Engineering Exploiting human weakness-tricking people into revealing sensitive information. Denial Of Service Unethical but I included it for informational purposes, it explains how to flood services, crash servers, etc. Deleting Entrys in LPage Guestbooks Sendmail8.8.4 exploit Alt.2600/#hack FAQ CodeWord (Most Common Passwords) When i knew i was a Hacker Some guys hacking experiences Mentor Another info phile Newbie Help for all you newbies The Ultimate Guide To Hacking And Phreaking Lots of good info, very comprehensive Unix Hacking Tutorial how to hack with a Unix OP SYS Macro Viruses Info on how to make and about Macro Viruses Common Passwords list Smashing the Stack for Fun and Profit Excellent article explaining buffer overflows. Vax/VMS basics A FAQ for new users of Vax/VMS systems, good for beginners. Hacking VAX Informative file on security protocols and measures on VMS. The Internet Worm Explains exactly what happened and how it worked. The Risks of Key Recovery, Key Escrow, and Trusted Third-Party EncryptionAn excellent article on modern cryptography. Hacking Jargon Is what it is....hacking jargon Password Recovery Techniques Hack Unix "An indepth guide in hacking Unix" How to erase log files Telenet Info NFS Tracing By Passive Network Monitoring Spying on ethernet traffic to gain information on NFS filesystem activity. Crontab Exploit Takes advantage of a buffer overflow problem. Beginner's guide to hack IRC FAQ's RemObs Info The AngelFire Hack Remailer Info Hackers Encyclopedia Getting Information Some methods of gaining information about people. Cracking the UPC Explanation of the barcoding system. Hacking FAQVarious Topics, just a bunch of different shitz HOWTOC A bunch of cracking information (12 text philez) The Ultimate Guide Passwd Files Breaking out of restricted Win95 Environments Have a shell account in 24 hours CMOS Killer Hacker's Handbook Crash NT Systems The fake-mail FAQ All About Viruses Info on viruses, trojans, worms, etc. Hacking Encyclopedia A Directory of Hacking Groups and Hackers NFS Tracing By Passive Network Monitoring Spying on ethernet traffic to gain information on NFS filesystem activity. Crontab Exploit Takes advantage of a buffer overflow problem. Internet Email Security A good discussion of sendmail and some of its basic flaws. Smashing the Stack for Fun and Profit Excellent article explaining buffer overflows. Vax/VMS basics A FAQ for new users of Vax/VMS systems, good for beginners. Hacking VAX Informative file on security protocols and measures on VMS. How to Find Security Holes Concepts in finding security breaches, mainly in software code. Social Engineering Exploiting human weakness-tricking people into revealing sensitive information. Hole List lengthy compilation of security holes. Denial Of Service Unethical but I included it for informational purposes, it explains how to flood services, crash servers, etc. Hacking Techniques A VERY basic text file describing a few simple tricks. The Internet Worm Explains exactly what happened and how it worked. The Risks of Key Recovery, Key Escrow, and Trusted Third-Party EncryptionAn excellent article on modern cryptography. Getting Information Some methods of gaining information about people. Cracking the UPC Explanation of the barcoding system. Hacking FAQVarious Topics, just a bunch of different shitz Hacking Handbook About fireworks and other pyrotechnics HOWTOC A bunch of cracking information (12 text philez) Hacking Jargon Is what it is....hacking jargon When i knew i was a Hacker Some guys hacking experiences Mentor Another info phile Newbie Help for all you newbies The Ultimate Guide To Hacking And Phreaking Lots of good info, very comprehensive Unix Hacking Tutorial how to hack with a Unix OP SYS Macro Viruses Info on how to make and about Macro Viruses All About Viruses Info on viruses, trojans, worms, etc. Hacking Encyclopedia A Directory of Hacking Groups and Hackers Infinity Boxes The Remote Informer JollyBox v4.3 MCI Glossary 1 of 2 MCI Glossary 2 of 2 Fucking-Hacker v2.0 Fears Phreaking Tools v2.3b Professor Falken's Phreaking Tools v1.1 Canadian Red Box Cyberphreak Modem Jammer v2.8 PBX Hacker v1.1 VMB Hacker v3.0 Gunbelt ]1[ Tone Box All of the Boxes 84 Different Boxes Bump Beep Blue Beep v0.10b A Quarter (wav format) PhreakMaster v1.0 Phreak Tools v1.1 Info on Internet Dialouts Blue Dial v6.2 Bell Special Intelligence Bluebox Dialer/Wardialer Info on Blue Boxes Info on Black Boxes Info on Beige Boxes Info on Cheese Boxes Info on Day Glo Boxes Info on Gold Boxes Info on Neon Boxes Info on Party Boxes Info on Silver Boxes Better Homes and Box Building 1 of 3 Better Homes and Box Building 2 of 3 Better Homes and Box Building 3 of 3 Bell Hell 1 of 2 Bell Hell 2 of 2 Box Tones Box Info Tone Box Planes Bullshitting the Phone Company How Phreakers are Caught European Blue Boxing Info on European Boxing German Blue Boxes ToneGen v2.0b Multifrequency Dialer Omega Team Blue Box Official Phreakers Manual Technical Book of Phreaking Build a Red Box Red Box Construction Info on Mercury Switch Ideas How to build and use a Red Box Various RedBox plans and programs Guide to Switches The Little Operator v3.3 WinPhreak Demon Phreak Suite Modem Hunter V2 Omega tone generator Phreaking Utility Tone generator Tones for quarters Guide to Brazilian Telephones Phreaker's Manual Explains everything that covers phreaking DOS Box Simulator (red,blue,green,silver) Mobile Phones Phreaker's TechBook Cyber Phreak Cyber Phreak, easy to use windows blue/red box. Another DOS Box Simulator (red,blue,green,silver) Windoze Box Simulator & Dialer (red,blue) Professer Falken's Phreak Tools WinPhreak Demon Phreak Suite Modem Hunter V2 Omega tone generator Phreaking Utility Tone generator Tones for quarters Official Phreak Manual Cell Zip 25 Cellular programs for Motorola, Nec, Nokia, Panasonic, and Beech Cell Info Provides Band,Receive Frequency,Global Cell Number,Cell Network #, CellChannel Cell Manager 1.0 Reference program, much like ProFalkins Phreakers Tools, cept for Cellular phones Cell Manager 2.00beta Reference program, much like ProFalkins Phreakers Tools, cept for Cellular phones Check Calc This is a checksum calculator for Nokia,Mobira,Radio Shack\Tandy Cellphone ESN's Spectrum Anarchy ENS Format Convertor Hex ESN Convertor Hex-Decimal ESN Convertor writting in BASIC ESn Convertor v3.3 ESN converter with cutesy little Interface... Hacking The FOVC Stuff for hacking the FOrward Voice Channel 6111 software v3.02G used to configure the semi permanent links in TRI, after which the BTS may be tested Motorola Hack Motorola Celluar Programming Series v6.6 ROM Files ROM files for programming on phones above software rev 9121 in motorola cellphones NiceGrab II Release 1 Supposedly the ultimate grabbing program rmd.zip SnarfWare v0.8beta Cell Phone hacker Snarfware v0.9 Cell Phone Hacker Pagers CHaoS DeViCe VeR 1.0 Calls random pagers, puts in a phone #, hangs up, and goes all over again.. sounds like some good mischief! ESN Prefixes ESN Prefixes by code Page IT v2.2 Page many different pagers, put in 1 #, or page 1 pager, put in many numbers! POCSAG Decoder v2.0 Allows off-air decoding of POCSAG paging signals at 512, 1200 or 2400 bps POCSAG Encoder v1.0 Umm.. perhaps off-air encoding of POCSAG paging signals at 512, 1200 or 2400 bps? Cracking How To Crack More help on cracking POP Mail Cracker Box Schemes Red Box Plans & Programs Radio Shack Dialer Red Box Plans Hallmark Card Red Box Plans Blue Boxing Green Box Plans Silver Box Plans Black Box Plans Tron box Urine box Yellow box Red box Scarlet box Silver box Jack box Neon box Paisley box Pandora's box Pearl box Some gadgets BBS Hacking Hack BBS Program to break in to BBSes THC RA hacking tools Hacking tools & bruteforce cracker to help you hack a RA board Rahacker A bruteforce hacker for RA user-lists Hack BBS v 0.2 A program to infiltrate a BBS Archive Crackers Break Arj Program to Break up .ARJ files Zip Cracker Bruteforce and wordlist cracker for .ZIP's Zip cracker Another .ZIP cracker Zip Crack Yet another .ZIP cracker Break Arj2nd site Zip Cracker3rd site Zip cracker2nd site Zip Crack3rd site Break ARJ Fast Zip Cracker Carding/Fraud CallCard Generating Program VCard Carding Utility CCG Calling Card Generator CMaster4 Credit Card Generator Cardpro Generate credit card numbers. Credit Master v.4 Excellent Credit Wizard v.1.0 Another credit-card-number maker. VCard v1.0 Carding Utility AT&T CCG Calling Card Generator Credit Card Verifier Credit Card Commando Identifier and Verifier Credit Card Dialer Credit Master v.1 Credit Card Number Generator Credit ProbeVerifies Credit Card Numbers Credit Master v.3 Credit Wizard v.1.1 BETA 1 THC Credit v.1.6 V-Card v.1.25 CHaSeRz CC Generator/Extrapolater Carding in the 90's Carding for Beginners: Part I The Adventures in Fraud Series Vol 1 Real Credit Card Fraud How to go carding, the AAA way Careful Carding Techniques The Art of Carding Carding How 2 Card Shit, When U Still Live Wit ur Parents Carding, My way Credit Card Guide If don't know how to card then this file is for you How to card your ASS off and never get caught A complete Tutorial on credit cards CDC- Credit Card Fraud Ideas! Beginning to advanced carding Keystroke Recorders KeyCopy v1.01 Key Copy Keystroke recorder *2nd site* Key Log Keystroke recorder Key Trap Keystroke recorder Keycopy Saves all that have been typed on the keyboard Phantom 2 Another keystroke recorder Key Rec/Phantom 2 Phantom 2 disguised as a memory tester Key Log for WiN95 Keystroke recorder for Windows 95 Key Log for Windows 3.X Keystroke recorder for Windows 3.x Nukers/Sniffers/Spoofers/Flooders/Port Scanners/ICQ Hak Tek bomb, scan ip PortPro Very good port scanner EyeDent Spoofer (202 kb) EyeDent spoofer allows you to fake your username on any ident request. like ftp sessions, telnet sessions, irc sessions (is a telnet session anways) from windows. Port Listen Listens a port to see if anyone is trying to nuke you Nuke1 One of the best, Nuker and Port Spy Nuke Detector See if someone is trying to nuke you WinNuke The Original Nuker WinGenocide-Nukes multiple IP's at once! Mass Nuker-The more the better! ConSeal PC Firewall THE best firewall for Win 95/98, although it is harder to use than nukenabber, etc.. it is worth it! Windows Nuke IT Pro One of the best nukers out there. Voob Nuke Very Fast Nuker Vai-te jŠ v2.01 (English Version) - Useful tool that includes an ICMP bomber, nuker, nuke detector, and OOB attacker Panther 2.0 Good nuker Muerte Supposedly a very good nuker, but it assume it is in spanish. ICMP Bomb Nuker bombs the ICMP protocol BitchSlap Port 139 nuker Divine Intervention 2 Divine Intervention 3 Ident D Spoofer Boom Port Bomber WinNuke for Win95 v1.1(nuker) WinNuke V1.0 Wnuke2(nuker) Wnuke4(nuker) Wnewk(nuker) Technophoria Battle Pong Pestilence v2.0, the Reaper(nuker) PortFuck(nuker) Hacking System This program has a whole bunch of programs in it. This is very useful for lots of things. You can find out things about people. You can find there ip. You can do just about everything with it. Hak Tek bomb, scan ip Click v2.2 PortPro Very good port scanner Remote Attack Suit EyeDent Spoofer (202 kb) EyeDent spoofer allows you to fake your username on any ident request. like ftp sessions, telnet sessions, irc sessions (is a telnet session anways) from windows. SNuke Ident Spoofer 95 Command IP Spoofer Nuke v2.3(nuker) Port Listen Listens a port to see if anyone is trying to nuke you Nuke Detector See if someone is trying to nuke you WinNuke v. ? The Original Nuker Panther Modern WinGenocide Nukes multiple IP's at once! BlueRain's Mass Nuker The more the better! Liquid Nuker Works ok Sniffers FAQ Ethernet Sniffer LinSniffer v0.03 Fergie Gobbler ICQ XiCQ Advanced Icq Chat Functions Mail Bomber into a ICQ Pager Bomber ICQ Nuker Nukes Someone's ICQ Using IP IcKiller Message Bomber ICQRevenge Pager Bomber ICQ MSG bomber 305 K -- Sends multiple messages ICQ Nuker 820 K -- Nuke the ICQ Network XiCQ 98 K -- Extra Options for ICQ chats *FIXED LINK* XiCQ Advanced ICQ chat functions. *2nd site* ICQ Nuker Scans for the correct port then shuts down the victims ICKiller Will bomb ICQ causing it to crash. IFuckQ ICQ Zap ICQ Nuker for dos ICnewQ Can spoof messages, bomb, and kill ICQ. ICQ Flood ICQ DeFlooder Clears the messages sent after you have been bombed. ICQ Bomb Squad Same as above. ICQ SWAT Same ICQ Protector While open this program protects you from being bombed. ICQ ContactList Lets you add a person to your contact list without his authorization. ICQ Message Flooder ICQ IP Sniffer ICQ Port Sniff! ICQ Protect ICQ Source UIN Spoofer Mail Bombers Avalanche 3.5 Good one Kaboom!3 Mail Bomber Anonymous E-Mailer amail 1.10 Send Anonymous E-mail List of anonymous email servers Amail 1.0 anonymous emailer Anonymous E-Mailer Death 'n Destruction v4.0 Avalanche 3.5 Beta Beta version which has many improvements with spasm and epileptic mode that speeds up the process. Requires the same files as 3.4. I like this one. BombSquad Necessary tool which can clean your mailbox from email bombs, but also save important messages. Avalanche 3.4 Supports clones and can send mail messages very fast. Has the ability to frame someone(making it look as if they did it). KaBoom 3 Very good Email Bomber Unabomber Pretty Fast EMail bomber UpYours3 You need certain files to run this one Typhoon 2nd site Wardialers A-Dial Wild Dial Bluebeep! One of the best wardialer Blue Beep 2nd site Wdial Wdial wardialer mf_dial wardialer Tone Loc v1.10 Tone Loc Utilities Phun-Pak v.03 THC-Scan v0.8 General Dialer v1.0 Code Theif v3.5 Deluxe A-Dial Wardialer A program to detect carrier presence Delux Fone-Code Hacker v5.0 Demon Dialer v1.05 Demon Typer-Dialer Exchange Scanner Grim Scanner v4.0 Modem Hunter v2.0 Super Dial v1.03 WildDialer v2.00 Scvanger-Dialer Novell Netware Netware Hacker The Novell Netware Hack-FAQ A good resource on basic Netware security. Passwd Crackers/Dictionary Files Brute (Unix Password Cracker) Killer Cracker(Unix Password Cracker) John2 THE Unix password cracker Cracker Jack Unix Passwd Cracker Guess: Unix Password Checker v1.21 Cracker Jack (Recommended) Killer Cracker v9.11 Crack 4.1 PGPCrack Lard v2.0 Guess Jill v2.0 Star Cracker Xit v2.0 New Hack U of MN POPMail Password Cracker 1.1 U of MN POPMail Password Cracker 1.0 U of MN SLIP Password Cracker v1.1 Glide WinCrack UIUC Wordlists Archives Dictionary Generator Dictionary Maker for DOS Internet Hacking How Kevin Mitnick hacked Tsutomu Shimomura with an IP sequence attack Very interesting, requires a knowledge of TCP/IP to understand. Source Routing An explanation of source-routing in conjunction with an IP spoofing attack and other situations. IP Addressing Information on the format of IP addresses, interesting but not for newbies. TCP/IP Weaknesses Flaws in BSD's protocol software. Simple Active Attack Against TCP/IP Rerouting TCP data streams to bypass authentication protocols such as kerberos. DHCP FAQ A thorough guide to the Dynamic Host Configuration Protocol Ethernet FAQ FAQ of Ethernet terminology. Tymnet Hacking Brief notes on hacking the Tymnet network . Telenet: The Secret ExposedA very thorough guide to using/hacking Telenet. Packet Switched NetworksA guide to Sprintnet and similar networks Security/Encryption UUencode/UUdecode v5.0 To encode files crypt3.zip Encoder.. Argus Cops v1.04 Global Security 32-Bit Internet Security Scanner NUA Attacker Satan 1.1.1 Satan Notes TCP Dump v3.0.2 Tiger v2.2.3 Trace Route Virii NUKE Radomic Life Generator Virii Generator G2 2nd Generation in Virus Creation MTE Virus Mutation Engine Nowhere Virus Utilities vs2.0 Popular and effective for distributing virii Polymorphic Engine Pretty self-explanatory Virus Construction Set 1.0 Better than Tinker Toys! Virus Creations Lab 2000 Down Egor! MIME Mini mutations Engine vs12.94 Trojan Generator Config file generator for G2 Boot sector virus tools Windows Virus Construction Kit Trojan Horse Construction Kit Dark Chasm's Ansi-bomb maker WaveFunc's Goofy Batch File Virus Generator Visible Mutation Engine TASM.exe Necessary to run many engines TLINK.exe Also necessary to run many Virii labs Trident Polymorphic Engine Virus Lab Tools Biological Warfare Creation Kit Rajaat's Tiny Flexible Mutator 63virus virus aircop virus amsterdam virus badboy1 virus cookie virus darkavenger virus dump virus jerusalem virus malaria virus stoned virus superhacker virus Lock Picking MIT-Guide to Lock Picking Guide To Lock Picking Picking Combination Locks Mischief/Anarchy/Explosives/Weapons Anarchy N Explosives vol. 1 Anarchy N Explosives vol. 2 Anarchy N Explosives vol. 3 Anarchy N Explosives vol. 4 Anarchy N Explosives vol. 5 Anarchy N Explosives vol. 6 Anarchy N Explosives vol. 7 The Terrorist Handbook Anarchist Cookbook DarkStorm's Book of Destruction The Terrorist Handbook Captain Hack's Book of Anarchy The Terrorist Handbook The Pyrotechnics Cookbook v1.0 The Anarchist Cookbook IV, v4.14 Vortex's Cookbook Free Shit Scamming *Must Read* How To Rip Off Coke Machines Guides Volume One gtmhh1-1 Introduction to hacking, description of telnet, and introduction to port surfing gtmhh1-2 Forging Email 101, and how to spot and track forgeries gtmhh1-3 Elaboration on finger, and lesson on fingering through telnet gtmhh1-4 How to fight Usenet spammers gtmhh1-5 How to fight Email spammers gtmhh1-6 How to get offensive web pages taken off the Web Volume Two gtmhh2-1 Introduction to the Internet and how it works gtmhh2-2 Introduction to Linux gtmhh2-3 Explanation of Win95 ping exploit, AKA "killer ping attack" and also just a basic introduction to ping gtmhh2-4 Elaboration on port surfing, and definition of daemons Volume Three gtmhh3-1 How to keep from being Email bombed, and how to recover if you get bombed gtmhh3-2 How to map the Internet gtmhh3-3 How to protect yourself on IRC Law Editions Number One Beginners Series Number One Number Two Hacking from/into wind0ze Number Two Part Two Number Two Part Three Rainbow books NCSC-TG-001 [Tan Book] A Guide to Understanding Audit in Trusted Systems [Version 2 6/01/88] NCSC-TG-002 [Bright Blue Book] Trusted Product Evaluation - A Guide for Vendors [Version 1 3/1/88] NCSC-TG-003 [Orange Book] A Guide to Understanding Discretionary Access Control in Trusted Systems [Version 1, 9/30/87] NCSC-TG-004 [Aqua Book] Glossary of Computer Security Terms [Version 1, 10/21/88] NCSC-TG-005 [Red Book] Trusted Network Interpretation [Version 1 7/31/87] NCSC-TG-006 [Orange Book] A Guide to Understanding Configuration management in Trusted Systems [Version 1, 3/28/88] NCSC-TG-007 [Burgundy Book] A Guide to Understanding Design Documentation in Trusted Systems NCSC-TG-008 [Lavender Book] A Guide to Understanding Trusted Distribution in Trusted Systems [Version 1 12/15/88] NCSC-TG-009 [Venice Blue Book] Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria NCSC-TG-011 [Red Book] Trusted Network Interpretation Environments Guideline - Guidance for Applying the Trusted Network Interpretation NCSC-TG-013 [Pink Book] Rating Maintenance Phase Program Document NCSC-TG-014 [Purple Book] Guidelines for Formal Verification Systems [4/1/89] NCSC-TG-015 [Brown Book] A Guide to Understanding Trusted Facility Management [6/89] NCSC-TG-016 [ Book] Writing Trusted Facility Manuals NCSC-TG-017 [Light Blue Book] A Guide to Understanding Identification and Authentication in Trusted Systems NCSC-TG-019 [Blue Book] Trusted Product Evaluation Questionnaire [Version 1, 10/16/89] NCSC-TG-020A [Grey Book] Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System NCSC-TG-021 [Lavender Book] Trusted Database Management System Interpretation NCSC-TG-025 [Green Book] A Guide to Understanding Data Remanence in Automated Information Systems NCSC-TG-026 [Peach Book] A Guide to Writing the Security Features User's Guide for Trusted Systems Other NSA/NCSC Publications NCSC DPL Degausser Products List [27 February 1989] NCSC ETL Endorsed Tools List NCSC OAS A Guideline on Office Automation Security [12/5/86] National Security Agency Computer Security Documents Ordering information from the the National Security Agency INFOSEC Awareness Office and the Government Printing Office and an order form. NCSC C-Technical Report 32-92 The Design and Evaluation of INFOSEC Systems: The Computer Security Contribution to the Composition Discussion CSL BULLETIN DISPOSITION OF SENSITIVE AUTOMATED INFORMATION October 1992 Defense Department Rainbow Series CSC-STD-001-83 [Orange Book] DOD Trusted Computer System Evaluation Criteria [DOD 5200.28] CSC-STD-002-85 [Green Book] DoD Password Management Guidelines CSC-STD-003-85 [Light Yellow Book] Guidance for Applying the DoD Trusted Computer System Evaluation Criteria in Specific Environments CSC-STD-004-85 [Yellow Book II] Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements AOL Proggies ICP final: Great!! ICP Final Great Punter. Has a lot of methods. I mean a lot! Rating: 8 Password: ICP is Fucken GoD PePsi4.0 Another great prog! A MUST DOWNLOAD! Rating:9 1/2 Pepsi 4.0 Great program almost as good as Fate MiBFiNAL yet another site for this one AOHell 1.16 Mb AOLPRoGS BOARDs *Post Proggiez/Filez u need in here.... AOLPRoGS CHaT Unix Red Hat Linux Debian Slackware Linux MkLinux (Linux for Macs) The Unix Training Manual which the Government uses to train it's employees on Unix Linux Installation HowTo Linux FAQ Linux Information Sheet Windows95 Linux Boot Loader Unix Guide For newbies, read it! Beginner's Guide To Hacking UNIX An Indepth Guide To Hacking UNIX Hacking tips for UNIX A description of a few small hacks Improving the Security of Your Site By Breaking Into It A UNIX Hacking Tutorial One of the best UNIX tutorials out there COPS & Robbers-UNIX System Security An outline of analyzing a UNIX system's security with the COPS program. UNIX Security Checklist Outlines common errors in administration and general Unix System V How to hack UNIX System V UNIX Backdoors How to hold on to root. Hacking UNIX Basic tutorial of UNIX security. Bourne Programming A thorough shell programming manual. Crash Course in X Windows Security Explains the security risks of X Windows including screen capturing. The SMTP Protocol A complete description of the Simple Mail Transfer Protocol Sendmail 8.6.4 Bug Security hole that allows user to get root shell PHF Vulnerability Unix Bible A Guide to Hack Unix Unix Guide For newbies, read it! Hacking tips for UNIX A description of a few small hacks Improving the Security of Your Site By Breaking Into It A UNIX Hacking Tutorial One of the best UNIX tutorials out there COPS & Robbers-UNIX System Security An outline of analyzing a UNIX system's security with the COPS program. Hacking UNIX Basic tutorial of UNIX security. Bourne Programming A thorough shell programming manual. Crash Course in X Windows Security Explains the security risks of X Windows including screen capturing. The SMTP Protocol A complete description of the Simple Mail Transfer Protocol Sendmail 8.6.4 Bug Security hole that allows user to get root shell Visual Basic Runtimes, DLLs, VBXs, etc Visual Basic 5 Runtimes *YOU NEED THESE FILES FOR BOMBERS/NUKERS/ICQ NUKERS* Includes: MSVBVM50.DLL, OLEPRO32.DLL, OLEAUT32.DLL, ASYCFILT.DLL, COMCAT.DLL, STDOLE2.TLB. http://www.smart.is/pub/Runtime-dll-Vb1-4/VB4/?plain -- A library of VisBasic runtime .dll's which you'll need to run UpYours! 2.0 and possibly some of the others. Don't get all of them--the program will tell you which ones you need when you run it for the first time after installing it. Misc. Hacking Hacking Tools AMI BIOS Cracker Award BIOS v4.22 Password Calculator AMI Decode Crack AMI Bios The Login Hacker: Final The Phreak Master Modem Signal Jammer-I can't guarantee that it will hide you though BannanaCom - A killer very small dialup proggie for dialing into BBS's, etc. An awesome Proggie written by some Haxors to emulate 33.6 bauds from a 28.8... It really works! Speeds up slower modems in a lot of cases too... HakTek Bad as fuck utilities HAckUT Hacking Tools Hide & Seek Hide files in GIF files and get them out again Loops Explained More on Trashing Link Looker PBX Scanner NUA Scanner Modem Jammer Login Hacker IP Host Scanner Hack Pak IP Scanner Playback Ethernet Packet Dumper CodeHack Narc v1.0 Zines Phrack archive zines 40 Hex Magazine Anarchy 'N' Explosives The Art of Technology Digest Activist Times Inc. The BIOC Files The Cult of the Dead Cow Chalisti Digital Free Press Freakers Bureau Incorporated Freedom Informatik Chaos Digest The Legion of Doom Technical Journals Legions of Lucifer Miscellaneous Underground Files N.A.R.C Newsletter The New Fone Express Network Information Access National Security Anarchists Phantasy Magzine PHUN Magazine Pirate Magazine The Syndicate Report United Phreakers Incorporated Newsletter Vindicator Publications The WorldView