******
Welcome by the Ultimate Hacking and Phreaking Page. There's nothing illegal on this page,
because all files are linked. I hope you enjoy and have much hack-fun.
Click here for the best list of up-to-date serials...
If it's not there (may be?) go here now!!!
Powered by hack.box.sk It's great!!
If you like to react or if you find any errors on my page, please mail me: mr.norckon@usa.net
Site best viewed with Netscape Navigator 4.0 or higher.
Site been seen
times since 07/06/98 (MM/DD/YY)
Hacking Texts
- Alt.2600/#hack FAQ
- Hacker's Handbook
- Hack Unix "An indepth guide in hacking Unix"
- Answering machines: how to crack them Very informational and probably working.
- Hacking Answering Machines Hacking answering machines.
- The fake-mail FAQ
- IRC FAQ's
- Remailer Info
- RemObs Info
- Telenet Info
- Virus FAQ
- A beginners guide to hacking unix A very old text but makes one feel very nostalgic.
- Hacking Compuserve A file on how to hack your own account at Compuserve.
- Free compuserve access Another file on how to get free compuserve accounts.
- How to rip Adventure games and some other games too... It only works on older games.
- How to get a free account on compuserve Another compuserve file.
- The Hackers Handbook can still be useful since Unix hasn't changed very much.
- The MMC guide to hacking, phreaking & carding. Mostly hacking. Pretty good.
- Hacking Techniques Good file about many different forms of hacking.
- The ultimate beginners guide to hacking Great hacking guide
- NFS Tracing By Passive Network Monitoring Spying on ethernet traffic to gain information on NFS filesystem activity.
- Crontab Exploit Takes advantage of a buffer overflow problem.
- Internet Email Security A good discussion of sendmail and some of its basic flaws.
- Smashing the Stack for Fun and Profit Excellent article explaining buffer overflows.
- Vax/VMS basics A FAQ for new users of Vax/VMS systems, good for beginners.
- Hacking VAX Informative file on security protocols and measures on VMS.
- How to Find Security Holes Concepts in finding security breaches, mainly in software code.
- Social Engineering Exploiting human weakness-tricking people into revealing sensitive information.
- Hole List lengthy compilation of security holes.
- Denial Of Service Unethical but I included it for informational purposes, it explains how to flood services, crash servers, etc.
- Hacking Techniques A VERY basic text file describing a few simple tricks.
- The Internet Worm Explains exactly what happened and how it worked.
- The Risks of Key Recovery, Key Escrow, and Trusted Third-Party EncryptionAn excellent article on modern cryptography.
- Getting Information Some methods of gaining information about people.
- Cracking the UPC Explanation of the barcoding system.
- Hacking FAQVarious Topics, just a bunch of different shitz
- Hacking Handbook About fireworks and other pyrotechnics
- HOWTOC A bunch of cracking information (12 text philez)
- Hacking Jargon Is what it is....hacking jargon
- When i knew i was a Hacker Some guys hacking experiences
- Mentor Another info phile
- Newbie Help for all you newbies
- The Ultimate Guide To Hacking And Phreaking Lots of good info, very comprehensive
- Unix Hacking Tutorial how to hack with a Unix OP SYS
- Macro Viruses Info on how to make and about Macro Viruses
- All About Viruses Info on viruses, trojans, worms, etc.
- Hacking Encyclopedia A Directory of Hacking Groups and Hackers
Phreaking
Cracking
Box Schemes
F
i
n
d
i
t
h
e
r
e
T
o
p
W
a
r
e
z
S
i
t
e
z
!
________Go there________
BBS Hacking
Archive Crackers
Carding/Fraud
Keystroke Recorders
Nukers/Sniffers/Spoofers/ICQ
- Boom Port Bomber
- Hacking System This program has a whole bunch of programs in it. This is very useful for lots of things. You can find out things about people. You can find there ip. You can do just about everything with it.
- Hak Tek bomb, scan ip
- PortPro Very good port scanner
- EyeDent Spoofer (202 kb) EyeDent spoofer allows you to fake your username on any ident request. like ftp sessions, telnet sessions, irc sessions (is a telnet session anways) from windows.
- Port Listen Listens a port to see if anyone is trying to nuke you
- Nuke1 One of the best, Nuker and Port Spy
- Nuke Detector See if someone is trying to nuke you
- WinNuke The Original Nuker
- WinGenocide-Nukes multiple IP's at once!
- Mass Nuker-The more the better!
- Liquid Nuker-Works well!
ICQ
Mail Bombers
Wardialers
Novell Netware
- The Novell Netware Hack-FAQ A good resource on basic Netware security.
- Super Allows you to execute SYSCON as a supervisor
- Novell Utils A pack of useful novell utilities
- Nwpcrack NWPCRACK is a simple bruteforce hacker
- Bindery Program to operate on the bindery files, to crack pwds for example
- Novell Hack A program to grant supervisor access to all users on the network
- Getit A TSR-prog that saves usernames and passwords in a hidden file
- Novelbfh Novell Bruteforce hacker
- Burglar Create supervisor accounts
- Novell Hacking Tools I'm not sure if they work.
- NW-Hack Some kind of Novell hacking tool.
Passwd Crackers/Dictionary Files
Internet Hacking
Security/Encryption
Virii
Lock Picking
Mischief/Anarchy/Explosives/Weapons
Guides
Volume One
- gtmhh1-1 Introduction to hacking, description of telnet, and introduction to port surfing
- gtmhh1-2 Forging Email 101, and how to spot and track forgeries
- gtmhh1-3 Elaboration on finger, and lesson on fingering through telnet
- gtmhh1-4 How to fight Usenet spammers
- gtmhh1-5 How to fight Email spammers
- gtmhh1-6 How to get offensive web pages taken off the Web
Volume Two
- gtmhh2-1 Introduction to the Internet and how it works
- gtmhh2-2 Introduction to Linux
- gtmhh2-3 Explanation of Win95 ping exploit, AKA "killer ping attack" and also just a basic introduction to ping
- gtmhh2-4 Elaboration on port surfing, and definition of daemons
Volume Three
- gtmhh3-1 How to keep from being Email bombed, and how to recover if you get bombed
- gtmhh3-2 How to map the Internet
- gtmhh3-3 How to protect yourself on IRC
Law Editions
- Number One
Beginners Series
- Number One
- Number Two Hacking from/into wind0ze
- Number Two Part Two
- Number Two Part Three
AOL Proggies
- ICP final: Great!!
- FaTeX 3.0
- Fire Toolz 3.0 Great prog! A MUST DOWNLOAD! This has almost everything in it! Rating : 9 1/2
- ICP Final Great Punter. Has a lot of methods. I mean a lot! Rating: 8 Password: ICP is Fucken GoD
- Magenta 2 Good.Great. Has a lot of stuff in it. Rating: 8 1/2
- Wh0rd v2 Nice little punter. Great string. This is great to use on every day lamers. This punter isint that "great"punter peeps say it is though. Still,its only 54KB so download! Rating: 7 1/2
- PePsi4.0 Another great prog! A MUST DOWNLOAD! Rating:9 1/2
- Flex anti. Good anti. Interface is kinda crappy but its a GOOD anti. Rating: 8
- File safe WOW! One of the best to scan for pws or deltree! It says its better then Dr.Solomon in detecting pws and deltrees! A MUST DOWNLOAD!! Rating: 10!!
- Pepsi 4.0 Great program almost as good as Fate
- MiBFiNAL yet another site for this one
- AOHell 1.16 Mb
- AOLPRoGS BOARDs *Post Proggiez/Filez u need in here....
- AOLPRoGS CHaT
- MSN Roomkill Kills MSN chat rooms
Unix
Visual Basic Runtimes, DLLs, VBXs, etc
- Visual Basic 5 Runtimes *YOU NEED THESE FILES FOR BOMBERS/NUKERS/ICQ NUKERS* Includes: MSVBVM50.DLL, OLEPRO32.DLL, OLEAUT32.DLL, ASYCFILT.DLL, COMCAT.DLL, STDOLE2.TLB.
- http://www.smart.is/pub/Runtime-dll-Vb1-4/VB4/?plain -- A library of VisBasic runtime .dll's which you'll need to run UpYours! 2.0 and possibly some of the others. Don't get all of them--the program will tell you which ones you need when you run it for the first time after installing it.
Misc. Hacking
Top
Please feel free to go to the other page (More links and files!!)
Site created bij P. de Geus, 1998. © P. de Geus, The Netherlands.