Click on category name or software name. Some software requires WinZip to install. For IE users, hit Ctrl-F to search. Some programs must be unzipped into a folder before installation. It's highly recommended to view the text documents by Editplus.

Exploit and vulnerability: A great deal of documents of security vulnerability and lots of aggressive programs for hacking.
E-zine: 40 famous or underground e-zines of hacking and security.
Hacker culture: What is the meaning of the word hacker? Who are the hackers? What have they done? How can I be a hacker? There you will find the answers.
Hacking tool: There are about 250 hacking tools that are put into 11 categories. They are powerful weapons for hacking.
Security archive: This archive is a combination of the Bugtraq, CERT, linux-security, linux-alert, rootshell, security-discuss and security-audit mailing lists.
Tutorial: Some tutorials are provided here to help you to become a hacker.

Exploit and vulnerabilityBack to Category list

1. Exploits from hack.co.za: www.hack.co.za was a famous site that collected very much exploits. But it is closed forever.
2. Exploits from hoobie.net: Here is an aging, but still very relevant collection of security exploits for various operating systems.
3. Exploits from s0ftpj.org: The tools were created in order to improve security and privacy.
4. Exploits from w00w00.org: W00w00, with 30 active members, is currently the largest non-profit security team in the world. w00w00 was created over three years ago. We have members in 5 continents, and 11 countries (Australia, Argentina, Canada, Japan, France, Russia, England, Spain, Sweden, Germany, USA), and 14 U.S. states. The members are diverse in their abilities, location, and ethnicity. The team continues to grow because we accept those with strong capabilities and talents. Once someone becomes involved, they usually stay involved. Once a w00, always a w00.
5. Exploits from Teso.org: Teso is an international group of young and motivated computer programmers and security enthusiasts. With more than one dozen members specialized in the network security field we do spend a lot of time in research and development of new vulnerabilities and exploitation tools that are useful to both 'hackers' and security professionals.

E-zineBack to Category list

1. Security and hacking electronic magazines: 40 famous or underground e-zines of hacking and security.

Hacker cultureBack to Category list

1. Eric Steven Raymond's Home Page: Eric S. Raymond is not only a forerunner of open source but also a famous hacker. His writings are required courses to every hacker.
2. Hacker Pictures & Photos: Pictures of people who have made a mark in any of the following: programmable computer systems, computer networks, the Internet or the security involved with those systems.
3. Jargon: This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor.

Hacking toolBack to Category list

1. Backdoor: Also called a trapdoor. An undocumented way of gaining access to a program, online service or an entire computer system. The backdoor is written by the programmer who creates the code for the program. It is often only known by the programmer. A backdoor is a potential security risk.
2. DoS: Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks. But, like viruses, new DoS attacks are constantly being dreamed up by hackers.
3. Encryption: Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.
4. Firewall: A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
5. IDS: An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.
6. Integrity detection: Integrity detection software is a policy driven file system integrity checking tool that allows system administrators to verify the integrity of their data.
7. Miscellaneous: Other helpful tools to hackers.
8. Network tool: These network tools are very useful for hacking.
9. Password cracking: A password cracker is any program that can decrypt passwords or otherwise disable password protection. A password cracker need not decrypt anything. In fact, most of them don't. Real encrypted passwords, as you will shortly learn, cannot be reverse-decrypted.
10. Scanner: A security scanner is a software which will audit remotely a given network and determine whether bad guys may break into it, or misuse it in some way.
11. Sniffer: Sniffers can be used both for legitimate network management functions and for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal.

Security archiveBack to Category list

1. Security Archive: Security archive from Bugtraq, CERT, rootshell, etc.

TutorialBack to Category list

1. GNU Software Manual: It is a full manual of gnu software.
2. Linux HOWTO: Linux HOWTOs are documents which describe in detaila certain aspect of configuring or using Linux.

Exploit and vulnerability

Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
1. Exploits from hack.co.za
www.hack.co.za was a famous site that collected very much exploits. But it is closed forever.
Type: Free



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
2. Exploits from hoobie.net
Here is an aging, but still very relevant collection of security exploits for various operating systems.
Type: Free



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
3. Exploits from s0ftpj.org
The tools were created in order to improve security and privacy.
Type: Free



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
4. Exploits from w00w00.org
W00w00, with 30 active members, is currently the largest non-profit security team in the world. w00w00 was created over three years ago. We have members in 5 continents, and 11 countries (Australia, Argentina, Canada, Japan, France, Russia, England, Spain, Sweden, Germany, USA), and 14 U.S. states. The members are diverse in their abilities, location, and ethnicity. The team continues to grow because we accept those with strong capabilities and talents. Once someone becomes involved, they usually stay involved. Once a w00, always a w00.
Type: Free



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
5. Exploits from Teso.org
Teso is an international group of young and motivated computer programmers and security enthusiasts. With more than one dozen members specialized in the network security field we do spend a lot of time in research and development of new vulnerabilities and exploitation tools that are useful to both 'hackers' and security professionals.
Type: Free



E-zine

Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
1. Security and hacking electronic magazines
40 famous or underground e-zines of hacking and security.
Type: Free



Hacker culture

Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
1. Eric Steven Raymond's Home Page
Eric S. Raymond is not only a forerunner of open source but also a famous hacker. His writings are required courses to every hacker.
Type: Free
From: http://tuxedo.org/~esr/


Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
2. Hacker Pictures & Photos
Pictures of people who have made a mark in any of the following: programmable computer systems, computer networks, the Internet or the security involved with those systems.
Type: Free



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
3. Jargon
This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor.
Type: Free
From: http://www.tuxedo.org/~esr/jargon/


Hacking tool

Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
1. Backdoor
Also called a trapdoor. An undocumented way of gaining access to a program, online service or an entire computer system. The backdoor is written by the programmer who creates the code for the program. It is often only known by the programmer. A backdoor is a potential security risk.
Type: Freeware



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
2. DoS
Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks. But, like viruses, new DoS attacks are constantly being dreamed up by hackers.
Type: Freeware



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
3. Encryption
Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.
Type: Freeware



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
4. Firewall
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Type: Freeware



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
5. IDS
An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.
Type: Freeware



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
6. Integrity detection
Integrity detection software is a policy driven file system integrity checking tool that allows system administrators to verify the integrity of their data.
Type: Freeware



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
7. Miscellaneous
Other helpful tools to hackers.
Type: Freeware



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
8. Network tool
These network tools are very useful for hacking.
Type: Freeware



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
9. Password cracking
A password cracker is any program that can decrypt passwords or otherwise disable password protection. A password cracker need not decrypt anything. In fact, most of them don't. Real encrypted passwords, as you will shortly learn, cannot be reverse-decrypted.
Type: Freeware



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
10. Scanner
A security scanner is a software which will audit remotely a given network and determine whether bad guys may break into it, or misuse it in some way.
Type: Freeware



Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
11. Sniffer
Sniffers can be used both for legitimate network management functions and for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal.
Type: Freeware



Security archive

Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
1. Security Archive
This archive is a combination of the Bugtraq, CERT, linux-security, linux-alert, rootshell, security-discuss and security-audit mailing lists.
Type: Free
From: News group


Tutorial

Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
1. GNU Software Manual
It is a full manual of gnu software.
Type: Free
From: http://www.tldp.org


Install or save this softwareBack to indexGoto previous softwareGoto next SoftwareGoto top of this page
2. Linux HOWTO
Linux HOWTOs are documents which describe in detaila certain aspect of configuring or using Linux.
Type: Free
From: http://www.tldp.org