Quantcast
Channel: Hackers Online Club (HOC)
Browsing all 855 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

CloseTheDoor : A Straightforward Tool

CloseTheDoor: A Straightforward Tool CloseTheDoor identifies all the listening ports TCP/UDP over IPv4/v6 and the associated program files. This will help you to detect security holes and close...

View Article


Image may be NSFW.
Clik here to view.

IPsec-Tools: Tools For IPSec Implementations

IPsec-Tools: Tools For IPSec Implementations IPsec is known as "IP security". It is a means of verifying as well as optionally encrypting TCP/IP traffic, therefore, make sure a selected measure of...

View Article


Image may be NSFW.
Clik here to view.

IP Filter Updater – uTorrent: Fake IP Addresses Filtering Tool

IP Filter Updater – uTorrent: Fake IP Addresses Filtering TooluTorrent users can gain from having naughty IP addresses that deleted from the torrent swarm. It can automatically filter the fake IP...

View Article

Image may be NSFW.
Clik here to view.

Untangle: A Linux-Based Network Gateway

Untangle: A Linux-Based Network GatewayUntangle is a privately held company based in San Jose, California, which provides network management software. Untangle NG Firewall is used by nearly 40,000...

View Article

Image may be NSFW.
Clik here to view.

Network Tracking Database: Track Your ARP/MAC Table Changes & So Much More

Network Tracking Database: Track Your ARP/MAC Table Changes & So Much MoreThe Network Tracking Database(NetDB for short) tracks all changes to the MAC address tables on your switches and the ARP...

View Article


Image may be NSFW.
Clik here to view.

Dradis Framework: An Open-Source Framework

Dradis Framework: An Open-Source FrameworkDradis is a tool for effective sharing information among participants in a penetration test. When a tester’s team is working on the same project having a...

View Article

Image may be NSFW.
Clik here to view.

SQL Power Injector: A Graphical Application

SQL Power Injector: A Graphical ApplicationA graphical application created in C# .Net 1.1 which helps the penetration tester to find as well as exploit SQL commands on a web page. Its main strength is...

View Article

Image may be NSFW.
Clik here to view.

FileKiller: A Free Downloadable Cleaner

FileKiller: A Free Downloadable CleanerFileKiller is a free downloadable Cleaner for Windows-based PC that permits you to remove files permanently and safely from your PC. And it leaves no trace that...

View Article


Image may be NSFW.
Clik here to view.

ShellTer: A Dynamic Shellcode Injection Tool

ShellTer : A Dynamic Shellcode Injection ToolShellTer is an iptables-based firewall. What sets it apart from the rest is that it has built-in SSH brute force protection. It is simple to organize as...

View Article


Image may be NSFW.
Clik here to view.

No Autorun: A Tool To Block The Viruses

No Autorun: A Tool To Block The VirusesNo Autorun is a tool to block the viruses in USB flash/disk from auto-running. While a USB disk is injected this tool which does not only lock the "autorun.inf"...

View Article

Image may be NSFW.
Clik here to view.

Ccrypt: A Tool For Encryption & Decryption Of Files

Ccrypt: A Tool For Encryption & Decryption Of FilesCcrypt is a command-line utility for encrypting and decrypting files as well as streams. It replaces the old Unix crypt utility. It offers the...

View Article

Image may be NSFW.
Clik here to view.

PortableSigner: A Tool For Digital Signing Of PDF Files

PortableSigner: A Tool For Digital Signing Of PDF FilesPortableSigner is a tool for digital signing with X.509 certificates of PDF files. It is platform independent and runs under Linux, Windows 2000,...

View Article

Image may be NSFW.
Clik here to view.

Malzilla: An Advanced Malware-Hunting Tool

Malzilla: An Advanced Malware-Hunting ToolMalzilla is an advanced malware-hunting tool which is specialized for hunting web-based exploits, interpret obfuscated JavaScripts etc.It can discover the HTML...

View Article


Image may be NSFW.
Clik here to view.

18 Year Old Hacks Pentagon Websites And Receives Appreciation From Government

18 Year Old Hacks Pentagon Websites And Receives Appreciation From GovernmentDavid Dworken, an 18 year old recent high school graduate from Washington area, appeared at the Pentagon ceremony alongside...

View Article

Image may be NSFW.
Clik here to view.

Turn Your PC Into A Web Proxy By Windows Trojan Using TeamViewer

Turn Your PC Into A Web Proxy By Windows Trojan Using TeamViewer.BackDoor.TeamViewer.49 is the name of a backdoor trojan which is found by Russian security dealer Dr.Web, who declares it will install...

View Article


Image may be NSFW.
Clik here to view.

How To Hack Android Secure Gallery App Password From Application Backup

How To Hack Android Secure Gallery App Password From Application Backup?Here is how you retrieve password of secure gallery app form its backup and see locked pictures in the app. This hack doesn't...

View Article

Image may be NSFW.
Clik here to view.

Cybercrooks Are Hijacking IPv4 Addresses For The Black Market

Cybercrooks Are Hijacking IPv4 Addresses For The Black MarketAn IPv4 address is a unique computer address that underpins the internet today. But recent trends of Internet shows that the current pool of...

View Article


Image may be NSFW.
Clik here to view.

Acer Website Hacked! 34,500 Customers' Credit Card Details Leaked

Acer Website Hacked! 34,500 Customers' Credit Card Details LeakedIf you have purchased an Acer Laptop, beware!!All the users who bought a laptop last year from Acer website using their credit card,...

View Article

Image may be NSFW.
Clik here to view.

Stuxnet: One of the Most Dangerous Cyber Weapons Ever Created

Stuxnet: One of the Most Dangerous Cyber Weapons Ever CreatedStuxnet is a computer worm which is specifically designed to attack embedded systems. Its primary target is to attack the industrial control...

View Article

Image may be NSFW.
Clik here to view.

Google Has Made 2-Factor Authentication A Lot Easier To Use With A New Feature

Google Has Made 2-Factor Authentication A Lot Easier To Use With A New Feature.Although Google has provided an excellent way to keep your account safe by using a two-factor authentication but now it...

View Article
Browsing all 855 articles
Browse latest View live