![]() |
Netbus 1.70
This is an awesome hacking tool. you can learn how to use by reading its readme file. It is very easy to use.It is the hottest hacking tool on the net.
Netbuster
NetBuster
can be used in TWO ways.
Either as a NetBus removal tool which
recognises the most usual NetBus trojans,OR as a
'fool-the-one-trying-to-netbus-you' tool When NetBuster is
activated and someone is trying to connect you via NetBus, the
NetBuster will log this persons IP adress together with date and
time. This might be useful if you want to report somebody to his
internet provider.
You will also see what the person is TRYING to
do, if he's trying to open the CD-Rom, deleting files or
whatever.
Most functions up to NetBus 1.60 is supported. If you
want, NetBuster can check if this person has the NetBus trojan
installed on his own system. A lot of people don't understand the
difference between the NetBus CLIENT and the SERVER (Trojan) so
they run both, and infects themselves.
If NetBus was found you
will be able to open/close his CD-Rom,turn on/off keyclick,
swap/restore his mousebuttons and set a password so that you can
connect him via your own version (i do believe you have one) of
NetBus.This will work EVEN if his NetBus is password protected.
If the guy don't have NetBus installed, you can fool him anyway
by sending a lot of annoying messages. This is what you can do
always, but you can also select a picture to be send as a
screendump, a wavefile to be send as recording, a fake directory
list to send on 'get directory listing' and a program to send as
download file. For example, someone connects you and want to see
what files on your harddrive.
He will retrieve a fake directory
listing including some interesting files. Probably he tries to
download any of these files (which doesn't exists), and if he
does he will retrieve the file you've selected, and it will be
sent with the same filename as the file he want.
There is a
directory list file called drive.dsk included with NetBuster that
you can use. If you want to edit your own personal diskfile then
open drive.dsk in notepad for instance and figure out how it's
build up. Then add your own dirs and files! Remember to use TAB
instead of SPACES, otherwise it won't work. It should work
properly under Win95/98/NT.
Lockdown 2OOO
LockDown 2000
prevents hackers and unauthorized users from accessing your
computer across the Internet or a local network. LockDown quickly
and automatically disconnects, traces and identifies
unauthorized users.
It prevents hackers from invading your
privacy, deleting files, or placing a virus or a trojan horse
program on your PC.LockDown allows you to watch or log in
real-time what remote users do on your computer. You can trace all
connections, and identify the source through their IP address,
domain name, and machine name. You can block all users or, if you
share your resources, you can allow certain individuals to access
your computer by listing their specific IP.
Other features
include: the ability to automatically disconnect users, and an
optional audio or visual warning that appears if someone connects
to your computer. This latest release adds background Trojan
scanning,support for detecting unknown trojans, the ability to
add anunlimited number of IP addresses to the IP filter, and the
ability to run Whois or Traceroute when a new connection is made.
Lockdown 3.0
It is the latest version of Lockdown 2000.
Backwork 2
It is
very rarely found,enfact it is not for sale.
It is created by a
hacker himself.It scans your pc for known trojans and removes
it.it can scan upto 150 trojans.
The Cleaner 2.0
The Cleaner 2.0 is a multi-trojan deleter/killer/disabler. It can detect about 100 trojans. This is a must download.
BOE (Back Orifice Eliminator)
recommendedBY VSNL . IT SCANS YOUR PC FOR BACK ORIFICE & REMOVES IT IF FOUND.VERY SIMPLE TO USE .
Date Crack
Removes Time Limit on demo softwares, betas, etc (cool is'nt it).You can use the Demo Software or beta products for life long with the Date-Cracker.