Joke Collection Website - Public benefit messages - Why, is there a QQ password cracking tool?
Why, is there a QQ password cracking tool?
Cgi network backdoor cgi network backdoor, written by envymask. ...
Web page merging This program can automatically generate web pages, merge web pages and EXE into new web pages, and automatically run EXE files while opening the web pages. You merged the Trojan horse into a web page, and after others browsed it, hehe, I didn't say anything ~ ~ ~
The Trojan of Ocean Top Network will never be killed in the windows environment, because it is made by asp, and it is also an excellent webpage editing software of asp online, which supports online changing, editing and deleting arbitrary text files. At the same time, the most important thing is to solve the problem that uploading asp has no components. ...
Cgi- Backdoors Several cgi Trojans (more than a dozen web script backdoors that exploit the latest vulnerabilities, covering jsp, php, asp, CGI, etc. ) *
Command line fallback category
winshell
WinShell is Telnet server software running on Windows platform. The main program is an executable file with only about 5k, which can be executed independently and does not depend on any system dynamic link library. Although small in size, it has extraordinary functions, supporting customized ports, password protection, multi-user login, NT service mode, remote file download, information customization and unique anti-DDOS functions.
Gina
Gina Troy's main function is to record the user's login name, login password and so on. When the system user logs in. Because this DLL is loaded when logging in, there is no such program as findpass, and users cannot be obtained when the user name is Chinese or the domain name is Chinese. ...
Wollf 1.5 The software written by a female hacker has expanded the Telnet service and integrated the functions of file transfer, Ftp server, keyboard recording, sniffer (win2k only) and port forwarding. It can be reversed, started together with the system, or started as a normal process through parameter selection.
The final version of winegdrop shell1.50 is in an extended telnet backdoor program (the strongest backdoor in China).
**********************************************************************************************
Rookie scanning software!
20CN IPC scanner official edition
Automatic IPC scanner can implant Trojans synchronously, and can detect some users that streamer can't detect through some incomplete firewalls. ...
Network broiler hunter
Small tool for quickly finding online broilers
The detective of web information makes the web page no longer have secrets, and all kinds of information are clear at a glance. Movies, pictures, emails, articles, Flash, compressed files, executable files and other link addresses are nowhere to hide! Download all kinds of software, package tutorials, VB, VC, animation tutorials, Flash, movies, photos and pictures continuously and quickly.
**************************************************************************************
SQL2.exe SQL nuisance heard it again, it is this loophole!
Powerful network toolkit ...
dvbbs.exe
Dynamic Network logout.asp Utilization Plan
THCsql
MSSQL OpenDataSource function vulnerability attacker found for David Litchfield, including source code.
Xiaozi V2.0 supplement
* Petty bourgeoisie *(LB Forum Nightmare) V2.0 Addendum Joining LB.EXE, you can get forum administrator authority.
LB5 Forum Bomber
The program written by my brother, {pushed}
LB5 Forum Bomber Revision 2.5 adds the following functions and features on the basis of the original functions of LB5 Forum Bomber Revision 2.0: 1 supports 6-thread bombing at the same time, which is more than twice as fast as V2.0; 2 machine intelligence is increased again, with automatic steering and positioning functions; Three monitoring windows have been added; The title can be changed. ...
MSN message attacks aircraft
This is a message attack aircraft for MSN Messenger (in fact, it is not limited to MSN). It has an ultra-fast attack speed. According to the test, the attack speed of ordinary Pentium 200 MMX can reach 5 pieces per second. Moreover, the software is active and small, which effectively saves system resources. ...
Strange Dog Special Edition 3389 Login I changed a small program with a user name and password, which can be used to log in to win system 3389 (required).
DameWare NT utility
A powerful Windows NT/2000/XP server remote control software, as long as it has a remote host management account, it can be used to log in to the interactive control host under the remote GUI. ...
Chase: find the IP address!
Willow wipes eyes.
This small software can list all the processes in the system (including hidden ones) and kill them. This is * * * exclusive software ... (Chinese version) "Let the legendary Troy go away"
Xdebug ey4s eldest brother wrote windows 2000 kernel vulnerability utilization, which can easily upgrade permissions!
The agent fox can get the latest agent to hide the real IP, but it is best to be the agent on the meat machine!
HackerDicBuilder is a dictionary making tool. According to the habit of setting passwords in Chinese, the dictionary file is generated by thread technology. ...
Scanipc is the most idiotic intrusion software Wood has ever seen. Just set the back door and IP range you want to upload and start working. The interface is simple and practical. Automatic IPC scanner can implant Trojans synchronously, and can detect some users that streamer can't detect through some incomplete firewalls. ...
Tiny Honeypot is a simple honeypot program, which is mainly based on redirection of iptables and a xinetd listener. It listens to every currently unused TCP port, records all active information, and provides some feedback information to intruders. The response part is all written in perl program, which provides enough interactive information to fool most automatic attack tools and a few intruders. By default, with appropriate restrictions, the program can be installed on the product host with little impact on the performance of the host (application platform Linux/POSIX).
Clearlog is used to delete the WWW and FTP security log files of Windows NT/2K/XP. Usually, in order to avoid being tracked after invading the server, this method is used to eliminate IP records ... Invasion Raiders.
LC4 can detect whether users use unsafe passwords, and it is the best and fastest password cracking tool for Win NT/2000 workstation. This is the latest version at present. It claims that on P300 machines, 90% of the super user (Admin) passwords can be cracked in less than 48 hours, and 18% can be cracked in less than 10 minutes. ...
Dictator DDOS tool, this software is too powerful, don't use it badly, or you may go to jail!
LocatorHack.exe ms locator! The remote overflow tool of formQueryPacket.wcscpy is as powerful as webdav vulnerability. Microsoft Windows locator service remote buffer overflow vulnerability
TFTPD32.exe graphical TPTP tool, without such tools as hackers, it is impossible to justify!
Iis5sp3 described that iis5 installed sp3 overflow successfully, but I didn't succeed under sp3 anyway!
Smbrelay.exe can use the web page to get the NT password hash! {Push storage}
IECookiesView 1.5 can rewrite cookie information, and it is much easier to cheat cookies with this tool.
MD5.exe HackPass.exe cracked MD5 password software ~!
DVGetPass.exe dynamic network tongji.asp vulnerability utilization tool, you can get the forum administrator authority, and then upload ASP Trojan! Hehe, just ~ ~ ~
Webadv has a high overflow success rate for iis+sp3 (system permissions after overflow! ) *
R_ webadv can use the version of webdav vulnerability tool! I heard that both traditional and Japanese are ok.
Fast ipc$ guess of ipscan large-scale network segment
Svc Remote Installation/Removal of win2k Service
3389. The remote installation of win2k terminal service by VBS does not require i386.
Arpsniffer arp environment sniffer (winpcap2. 1 or above required) *
Ascii query characters and numeric ascii codes (usually used to encode URLs to avoid id or script filtering)
Ca remote clone account
Cca checks whether there are cloned accounts.
Remote/local crack winvnc password (local crack -W parameter)
Pass.dic password dictionary
Debploit win2k+sp2 configures the best privilege promotion tool.
Fpipe port redirection tool
Command line version of fscan superscan (source port can be defined during scanning and udp port scanning can be supported) *
Hgod04 ddos attacker
Idahackeda overflow
Idq.dll uses isapi vulnerability to enhance its authority (it is very effective for sp0+sp 1+sp2, and it is also a great web back door).
IIS idq overflow
Inst.zip specifies that the program is installed as win2k service *
Ip_mail.rar Software for Sending Host Dynamic IP *
Ipc.vbs does not rely on ipc$ to log on to a remote host.
Ispc.exe idq.dll got through to the customer.
Keyghost.zip genuine keyboard recorder
Log.vbs log cleaner (remote cleaning does not depend on ipc$)
Msadc vulnerability overflow of msdc.plwinnt *
MsSqlHack mssql overflow program 1
Mysql client
Name.dic's most commonly used user name in China (see if your commonly used user name is in it).
Non-switch Passsniffer software, only 3kb *
Psexec directly logs into the host through ipc pipeline.
Pskill killed the owner of the process.
Pslist column process master file
Chinese version of winrar under rar command line (quite comprehensive in function) *
Reboot.vbs script for remotely restarting the host.
Sdemo.zip is a great screen capture video software.
Shed remotely finds the * * * resources of win9x.
User name of Sid column with sid.
SkServerGUI snake multi-agent software
SkSockServer snake agent
SMBCrack is a test prototype developed by Xiao Rong for Streamer 5. It is different from the previous SMB(***) brute force cracking tool. It does not use the API of the system, but uses SMB protocol. Windows 2000 can detect passwords multiple times in the same session ... Intruder.
Socks uses this tool to install Trojans. Even if the gateway is downgraded, the Trojan is still there.
SocksCap transforms the socks5 agent into a universal agent.
SPC.zip can directly display the password of remote WIN 98 * * Dongdong * shared resources.
WMIhack is based on wmi service execution account password (ipc is not required).
Skmontor snake's Registry Monitor (Cool)
Sql 1.exe mssql Overflow Program 2
Sql2.exe MSSQL overflow program 3
SqlExec mssql client
Excellent scanner with SuperScan GUI interface
Syn syn attacks the first master.
Upx 120 is an excellent compression software, which is often used to compress Trojan horses to avoid antivirus software.
Under command lines such as wget, dos/exe, dos/sys, rtm32/pe, tmt/adam, watcom/le, win32/pe, Linux/i386, the compression ratio is also very high. ...
**************************************************************************************
Rookie Trojan:
Kurai
Close to ink
Magic control
Grey pigeon
Snowstorm: Snowstorm at the back door made in China. According to the suggestions of some netizens, this version has improved several functions. One is that you can configure whether you can automatically * * * enjoy the function of drive C, and the other is that you add a password in the view menu to indicate whether you have used the * sign. At the same time, the BUG that the 1.3 version still opens the URL by pressing the Cancel button when opening the URL was fixed. ...
NetGod steals a remote control software, which can update quickly and access computers in the local area network. The connection is stable and the upload and download speed is fast, but it will be regarded as a Trojan horse by many antivirus manufacturers, requiring users to have their own FTP space. ...
He Bing 3
Guangwai boy
Guangwai girl
steal a glance
A set of remote monitoring software using reverse port technology can realize functions that ordinary remote control software can't, such as monitoring LAN and computer with firewall. The computer at the controlled end will have the function of automatically returning to the connection, the communication port can be dynamically modified at will, and there is an independent connection, which means that no one can listen to the connection except yourself. Other functions include online notification, connection rate adjustment, remote file manager, remote desktop monitoring,
Remote process management, remote login editing, web page notification service, DDoS attack and programming wizard of the controlled terminal, with options such as resident selection, file binding and connection mode. ...
After the hidden version of Mu Niu runs, the drive letter C on the server enjoys * * * (full control), and the ADMIN$ and IPC$*** are enabled, and the TELNET service is enabled to automatically create an administrator account: IUSR_COMPUTER password: IUSR_COMPUTER ... This version automatically modifies the registry and runs automatically after restarting.
IE'en is a software controlled remotely by IE. You can remotely control the action of IE and directly intercept the data communication between IE and any server. Confidential information such as user name and password you entered in IE is listed here. It can store or send this information in plain text. Once this software is started, any input and output in the browser window monitored at the remote end will be displayed in the local IE'en. To run ieen_s.exe (note: server), you need administrator privileges.
The thief monitors QQ, email and other passwords on the monitored terminal (computer with the program installed) and sends them to the email address you set.
- Related articles
- Beijing 12345 successfully appealed. Any tips?
- How long does it take to file a case online?
- Want to be a short message advertising marketing agent
- How can China Unicom receive SMS reminders when there is no phone bill?
- 12 What does the constellation man say when he is jealous?
- I have a supermarket. The tax bureau sent me a short message today. I don't know what to do.
- Can you still hear from the other party after the phone is hacked?
- What is the perfect SMS service?
- 202 1 arbor day wechat talk about the mood suitable for arbor day and say some phrases.
- A short copy of putting your girlfriend to bed.