Enter Jack's UnderGround here!
The Hackers handbo
Information on firewalls
The Hacker's Dictionary (big)
The Pirate's Friend
Starthack.txt: An intro to Hacking
The Hacker's Prayer
A list of some Unix BBS's out there
HackIRC.txt
Hacking Servers 101
How to Find Security Holes Concepts in finding security breaches, mainly in software code.
Social Engineering Exploiting human weakness-tricking people into revealing sensitive information.
Denial Of Service Unethical but I included it for informational purposes, it explains how to flood services, crash servers,
etc.
Deleting Entrys in LPage Guestbooks
Sendmail8.8.4 exploit
Alt.2600/#hack FAQ
CodeWord (Most Common Passwords)
When i knew i was a Hacker Some guys hacking experiences
Mentor Another info phile
Newbie Help for all you newbies
The Ultimate Guide To Hacking And Phreaking Lots of good info, very comprehensive
Unix Hacking Tutorial how to hack with a Unix OP SYS
Macro Viruses Info on how to make and about Macro Viruses
Common Passwords list
Smashing the Stack for Fun and Profit Excellent article explaining buffer overflows.
Vax/VMS basics A FAQ for new users of Vax/VMS systems, good for beginners.
Hacking VAX Informative file on security protocols and measures on VMS.
The Internet Worm Explains exactly what happened and how it worked.
The Risks of Key Recovery, Key Escrow, and Trusted Third-Party EncryptionAn excellent article on modern
cryptography.
Hacking Jargon Is what it is....hacking jargon
Password Recovery Techniques
Hack Unix "An indepth guide in hacking Unix"
How to erase log files
Telenet Info
NFS Tracing By Passive Network Monitoring Spying on ethernet traffic to gain information on NFS filesystem activity.
Crontab Exploit Takes advantage of a buffer overflow problem.
Beginner's guide to hack
IRC FAQ's
RemObs Info
The AngelFire Hack
Remailer Info
Hackers Encyclopedia
Getting Information Some methods of gaining information about people.
Cracking the UPC Explanation of the barcoding system.
Hacking FAQVarious Topics, just a bunch of different shitz
HOWTOC A bunch of cracking information (12 text philez)
The Ultimate Guide Passwd Files
Breaking out of restricted Win95 Environments
Have a shell account in 24 hours
CMOS Killer
Hacker's Handbook
Crash NT Systems
The fake-mail FAQ
All About Viruses Info on viruses, trojans, worms, etc.
Hacking Encyclopedia A Directory of Hacking Groups and Hackers
NFS Tracing By Passive Network Monitoring Spying on ethernet traffic to gain information on NFS filesystem activity.
Crontab Exploit Takes advantage of a buffer overflow problem.
Internet Email Security A good discussion of sendmail and some of its basic flaws.
Smashing the Stack for Fun and Profit Excellent article explaining buffer overflows.
Vax/VMS basics A FAQ for new users of Vax/VMS systems, good for beginners.
Hacking VAX Informative file on security protocols and measures on VMS.
How to Find Security Holes Concepts in finding security breaches, mainly in software code.
Social Engineering Exploiting human weakness-tricking people into revealing sensitive information.
Hole List lengthy compilation of security holes.
Denial Of Service Unethical but I included it for informational purposes, it explains how to flood services, crash servers,
etc.
Hacking Techniques A VERY basic text file describing a few simple tricks.
The Internet Worm Explains exactly what happened and how it worked.
The Risks of Key Recovery, Key Escrow, and Trusted Third-Party EncryptionAn excellent article on modern
cryptography.
Getting Information Some methods of gaining information about people.
Cracking the UPC Explanation of the barcoding system.
Hacking FAQVarious Topics, just a bunch of different shitz
Hacking Handbook About fireworks and other pyrotechnics
HOWTOC A bunch of cracking information (12 text philez)
Hacking Jargon Is what it is....hacking jargon
When i knew i was a Hacker Some guys hacking experiences
Mentor Another info phile
Newbie Help for all you newbies
The Ultimate Guide To Hacking And Phreaking Lots of good info, very comprehensive
Unix Hacking Tutorial how to hack with a Unix OP SYS
Macro Viruses Info on how to make and about Macro Viruses
All About Viruses Info on viruses, trojans, worms, etc.
Hacking Encyclopedia A Directory of Hacking Groups and Hackers
Infinity Boxes
The Remote Informer
JollyBox v4.3
MCI Glossary 1 of 2
MCI Glossary 2 of 2
Fucking-Hacker v2.0
Fears Phreaking Tools v2.3b
Professor Falken's Phreaking Tools v1.1
Canadian Red Box
Cyberphreak
Modem Jammer v2.8
PBX Hacker v1.1
VMB Hacker v3.0
Gunbelt ]1[
Tone Box
All of the Boxes
84 Different Boxes
Bump Beep
Blue Beep v0.10b
A Quarter (wav format)
PhreakMaster v1.0
Phreak Tools v1.1
Info on Internet Dialouts
Blue Dial v6.2
Bell Special Intelligence
Bluebox Dialer/Wardialer
Info on Blue Boxes
Info on Black Boxes
Info on Beige Boxes
Info on Cheese Boxes
Info on Day Glo Boxes
Info on Gold Boxes
Info on Neon Boxes
Info on Party Boxes
Info on Silver Boxes
Better Homes and Box Building 1 of 3
Better Homes and Box Building 2 of 3
Better Homes and Box Building 3 of 3
Bell Hell 1 of 2
Bell Hell 2 of 2
Box Tones
Box Info
Tone Box Planes
Bullshitting the Phone Company
How Phreakers are Caught
European Blue Boxing
Info on European Boxing
German Blue Boxes
ToneGen v2.0b
Multifrequency Dialer
Omega Team Blue Box
Official Phreakers Manual
Technical Book of Phreaking
Build a Red Box
Red Box Construction
Info on Mercury Switch Ideas
How to build and use a Red Box
Various RedBox plans and programs
Guide to Switches
The Little Operator v3.3
WinPhreak
Demon Phreak Suite
Modem Hunter V2
Omega tone generator
Phreaking Utility
Tone generator Tones for quarters
Guide to Brazilian Telephones
Phreaker's Manual Explains everything that covers phreaking
DOS Box Simulator (red,blue,green,silver)
Mobile Phones
Phreaker's TechBook
Cyber Phreak Cyber Phreak, easy to use windows blue/red box.
Another DOS Box Simulator (red,blue,green,silver)
Windoze Box Simulator & Dialer (red,blue)
Professer Falken's Phreak Tools
WinPhreak
Demon Phreak Suite
Modem Hunter V2
Omega tone generator
Phreaking Utility
Tone generator Tones for quarters
Official Phreak Manual
Cell Zip 25 Cellular programs for Motorola, Nec, Nokia, Panasonic, and Beech
Cell Info Provides Band,Receive Frequency,Global Cell Number,Cell Network #, CellChannel
Cell Manager 1.0 Reference program, much like ProFalkins Phreakers Tools, cept for Cellular phones
Cell Manager 2.00beta Reference program, much like ProFalkins Phreakers Tools, cept for Cellular phones
Check Calc This is a checksum calculator for Nokia,Mobira,Radio Shack\Tandy Cellphone ESN's
Spectrum Anarchy ENS Format Convertor
Hex ESN Convertor Hex-Decimal ESN Convertor writting in BASIC
ESn Convertor v3.3 ESN converter with cutesy little Interface...
Hacking The FOVC Stuff for hacking the FOrward Voice Channel
6111 software v3.02G used to configure the semi permanent links in TRI, after which the BTS may be tested
Motorola Hack Motorola Celluar Programming Series v6.6
ROM Files ROM files for programming on phones above software rev 9121 in motorola cellphones
NiceGrab II Release 1 Supposedly the ultimate grabbing program
rmd.zip
SnarfWare v0.8beta Cell Phone hacker
Snarfware v0.9 Cell Phone Hacker
Pagers
CHaoS DeViCe VeR 1.0 Calls random pagers, puts in a phone #, hangs up, and goes all over again.. sounds like some
good mischief!
ESN Prefixes ESN Prefixes by code
Page IT v2.2 Page many different pagers, put in 1 #, or page 1 pager, put in many numbers!
POCSAG Decoder v2.0 Allows off-air decoding of POCSAG paging signals at 512, 1200 or 2400 bps
POCSAG Encoder v1.0 Umm.. perhaps off-air encoding of POCSAG paging signals at 512, 1200 or 2400 bps?
Cracking
How To Crack
More help on cracking
POP Mail Cracker
Box Schemes
Red Box Plans & Programs
Radio Shack Dialer Red Box Plans
Hallmark Card Red Box Plans
Blue Boxing
Green Box Plans
Silver Box Plans
Black Box Plans
Tron box
Urine box
Yellow box
Red box
Scarlet box
Silver box
Jack box
Neon box
Paisley box
Pandora's box
Pearl box
Some gadgets
BBS Hacking
Hack BBS Program to break in to BBSes
THC RA hacking tools Hacking tools & bruteforce cracker to help you hack a RA board
Rahacker A bruteforce hacker for RA user-lists
Hack BBS v 0.2 A program to infiltrate a BBS
Archive Crackers
Break Arj Program to Break up .ARJ files
Zip Cracker Bruteforce and wordlist cracker for .ZIP's
Zip cracker Another .ZIP cracker
Zip Crack Yet another .ZIP cracker
Break Arj2nd site
Zip Cracker3rd site
Zip cracker2nd site
Zip Crack3rd site
Break ARJ
Fast Zip Cracker
Carding/Fraud
CallCard Generating Program
VCard Carding Utility
CCG Calling Card Generator
CMaster4 Credit Card Generator
Cardpro Generate credit card numbers.
Credit Master v.4 Excellent
Credit Wizard v.1.0 Another credit-card-number maker.
VCard v1.0 Carding Utility
AT&T CCG Calling Card Generator
Credit Card Verifier
Credit Card Commando Identifier and Verifier
Credit Card Dialer
Credit Master v.1 Credit Card Number Generator
Credit ProbeVerifies Credit Card Numbers
Credit Master v.3
Credit Wizard v.1.1 BETA 1
THC Credit v.1.6
V-Card v.1.25
CHaSeRz CC Generator/Extrapolater
Carding in the 90's
Carding for Beginners: Part I
The Adventures in Fraud Series Vol 1
Real Credit Card Fraud
How to go carding, the AAA way
Careful Carding Techniques
The Art of Carding
Carding
How 2 Card Shit, When U Still Live Wit ur Parents
Carding, My way
Credit Card Guide
If don't know how to card then this file is for you
How to card your ASS off and never get caught
A complete Tutorial on credit cards
CDC- Credit Card Fraud Ideas!
Beginning to advanced carding
Keystroke Recorders
KeyCopy v1.01
Key Copy Keystroke recorder *2nd site*
Key Log Keystroke recorder
Key Trap Keystroke recorder
Keycopy Saves all that have been typed on the keyboard
Phantom 2 Another keystroke recorder
Key Rec/Phantom 2 Phantom 2 disguised as a memory tester
Key Log for WiN95 Keystroke recorder for Windows 95
Key Log for Windows 3.X Keystroke recorder for Windows 3.x
Nukers/Sniffers/Spoofers/Flooders/Port Scanners/ICQ
Hak Tek bomb, scan ip
PortPro Very good port scanner
EyeDent Spoofer (202 kb) EyeDent spoofer allows you to fake your username on any ident request. like ftp sessions,
telnet sessions, irc sessions (is a telnet session anways) from windows.
Port Listen Listens a port to see if anyone is trying to nuke you
Nuke1 One of the best, Nuker and Port Spy
Nuke Detector See if someone is trying to nuke you
WinNuke The Original Nuker
WinGenocide-Nukes multiple IP's at once!
Mass Nuker-The more the better!
ConSeal PC Firewall THE best firewall for Win 95/98, although it is harder to use than nukenabber, etc.. it is worth it!
Windows Nuke IT Pro One of the best nukers out there.
Voob Nuke Very Fast Nuker
Vai-te já v2.01 (English Version) - Useful tool that includes an ICMP bomber, nuker, nuke detector, and OOB attacker
Panther 2.0 Good nuker
Muerte Supposedly a very good nuker, but it assume it is in spanish.
ICMP Bomb Nuker bombs the ICMP protocol
BitchSlap Port 139 nuker
Divine Intervention 2
Divine Intervention 3
Ident D Spoofer
Boom Port Bomber
WinNuke for Win95 v1.1(nuker)
WinNuke V1.0
Wnuke2(nuker)
Wnuke4(nuker)
Wnewk(nuker)
Technophoria Battle Pong
Pestilence v2.0, the Reaper(nuker)
PortFuck(nuker)
Hacking System This program has a whole bunch of programs in it. This is very useful for lots of things. You can find out
things about people. You can find there ip. You can do just about everything with it.
Hak Tek bomb, scan ip
Click v2.2
PortPro Very good port scanner
Remote Attack Suit
EyeDent Spoofer (202 kb) EyeDent spoofer allows you to fake your username on any ident request. like ftp sessions,
telnet sessions, irc sessions (is a telnet session anways) from windows.
SNuke
Ident Spoofer 95
Command IP Spoofer
Nuke v2.3(nuker)
Port Listen Listens a port to see if anyone is trying to nuke you
Nuke Detector See if someone is trying to nuke you
WinNuke v. ? The Original Nuker
Panther Modern
WinGenocide Nukes multiple IP's at once!
BlueRain's
Mass Nuker The more the better!
Liquid Nuker Works ok
Sniffers FAQ
Ethernet Sniffer
LinSniffer v0.03
Fergie
Gobbler
ICQ
XiCQ Advanced Icq Chat Functions
Mail Bomber into a ICQ Pager Bomber
ICQ Nuker Nukes Someone's ICQ Using IP
IcKiller Message Bomber
ICQRevenge Pager Bomber
ICQ MSG bomber 305 K -- Sends multiple messages
ICQ Nuker 820 K -- Nuke the ICQ Network
XiCQ 98 K -- Extra Options for ICQ chats *FIXED LINK*
XiCQ Advanced ICQ chat functions. *2nd site*
ICQ Nuker Scans for the correct port then shuts down the victims
ICKiller Will bomb ICQ causing it to crash.
IFuckQ
ICQ Zap ICQ Nuker for dos
ICnewQ Can spoof messages, bomb, and kill ICQ.
ICQ Flood
ICQ DeFlooder Clears the messages sent after you have been bombed.
ICQ Bomb Squad Same as above.
ICQ SWAT Same
ICQ Protector While open this program protects you from being bombed.
ICQ ContactList Lets you add a person to your contact list without his authorization.
ICQ Message Flooder
ICQ IP Sniffer
ICQ Port Sniff!
ICQ Protect
ICQ Source UIN Spoofer
Mail Bombers
Avalanche 3.5 Good one
Kaboom!3 Mail Bomber
Anonymous E-Mailer amail 1.10
Send Anonymous E-mail
List of anonymous email servers
Amail 1.0 anonymous emailer
Anonymous E-Mailer
Death 'n Destruction v4.0
Avalanche 3.5 Beta Beta version which has many improvements with spasm and epileptic mode that speeds up the
process. Requires the same files as 3.4. I like this one.
BombSquad Necessary tool which can clean your mailbox from email bombs, but also save important messages.
Avalanche 3.4 Supports clones and can send mail messages very fast. Has the ability to frame someone(making it look
as if they did it).
KaBoom 3 Very good Email Bomber
Unabomber Pretty Fast EMail bomber
UpYours3 You need certain files to run this one
Typhoon 2nd site
Wardialers
A-Dial
Wild Dial
Bluebeep! One of the best wardialer
Blue Beep 2nd site
Wdial Wdial wardialer
mf_dial wardialer
Tone Loc v1.10
Tone Loc Utilities Phun-Pak v.03
THC-Scan v0.8
General Dialer v1.0
Code Theif v3.5 Deluxe
A-Dial Wardialer
A program to detect carrier presence
Delux Fone-Code Hacker v5.0
Demon Dialer v1.05
Demon Typer-Dialer
Exchange Scanner
Grim Scanner v4.0
Modem Hunter v2.0
Super Dial v1.03
WildDialer v2.00
Scvanger-Dialer
Novell Netware
Netware Hacker
The Novell Netware Hack-FAQ A good resource on basic Netware security.
Passwd Crackers/Dictionary Files
Brute (Unix Password Cracker)
Killer Cracker(Unix Password Cracker)
John2 THE Unix password cracker
Cracker Jack Unix Passwd Cracker
Guess: Unix Password Checker v1.21
Cracker Jack (Recommended)
Killer Cracker v9.11
Crack 4.1
PGPCrack
Lard v2.0
Guess
Jill v2.0
Star Cracker
Xit v2.0
New Hack
U of MN POPMail Password Cracker 1.1
U of MN POPMail Password Cracker 1.0
U of MN SLIP Password Cracker v1.1
Glide
WinCrack
UIUC Wordlists Archives
Dictionary Generator
Dictionary Maker for DOS
Internet Hacking
How Kevin Mitnick hacked Tsutomu Shimomura with an IP sequence attack Very interesting, requires a knowledge of
TCP/IP to understand.
Source Routing An explanation of source-routing in conjunction with an IP spoofing attack and other situations.
IP Addressing Information on the format of IP addresses, interesting but not for newbies.
TCP/IP Weaknesses Flaws in BSD's protocol software.
Simple Active Attack Against TCP/IP Rerouting TCP data streams to bypass authentication protocols such as kerberos.
DHCP FAQ A thorough guide to the Dynamic Host Configuration Protocol
Ethernet FAQ FAQ of Ethernet terminology.
Tymnet Hacking Brief notes on hacking the Tymnet network .
Telenet: The Secret ExposedA very thorough guide to using/hacking Telenet.
Packet Switched NetworksA guide to Sprintnet and similar networks
Security/Encryption
UUencode/UUdecode v5.0 To encode files
crypt3.zip Encoder..
Argus
Cops v1.04
Global Security 32-Bit
Internet Security Scanner
NUA Attacker
Satan 1.1.1
Satan Notes
TCP Dump v3.0.2
Tiger v2.2.3
Trace Route
Virii
NUKE Radomic Life Generator Virii Generator
G2 2nd Generation in Virus Creation
MTE Virus Mutation Engine
Nowhere Virus Utilities vs2.0 Popular and effective for distributing virii
Polymorphic Engine Pretty self-explanatory
Virus Construction Set 1.0 Better than Tinker Toys!
Virus Creations Lab 2000 Down Egor!
MIME Mini mutations Engine vs12.94
Trojan Generator
Config file generator for G2
Boot sector virus tools
Windows Virus Construction Kit
Trojan Horse Construction Kit
Dark Chasm's Ansi-bomb maker
WaveFunc's Goofy Batch File Virus Generator
Visible Mutation Engine
TASM.exe Necessary to run many engines
TLINK.exe Also necessary to run many Virii labs
Trident Polymorphic Engine
Virus Lab Tools
Biological Warfare Creation Kit
Rajaat's Tiny Flexible Mutator
63virus virus
aircop virus
amsterdam virus
badboy1 virus
cookie virus
darkavenger virus
dump virus
jerusalem virus
malaria virus
stoned virus
superhacker virus
Lock Picking
MIT-Guide to Lock Picking
Guide To Lock Picking
Picking Combination Locks
Mischief/Anarchy/Explosives/Weapons
Anarchy N Explosives vol. 1
Anarchy N Explosives vol. 2
Anarchy N Explosives vol. 3
Anarchy N Explosives vol. 4
Anarchy N Explosives vol. 5
Anarchy N Explosives vol. 6
Anarchy N Explosives vol. 7
The Terrorist Handbook
Anarchist Cookbook
DarkStorm's Book of Destruction
The Terrorist Handbook
Captain Hack's Book of Anarchy
The Terrorist Handbook
The Pyrotechnics Cookbook v1.0
The Anarchist Cookbook IV, v4.14
Vortex's Cookbook
Free Shit
Scamming *Must Read*
How To Rip Off Coke Machines
Guides
Volume One
gtmhh1-1 Introduction to hacking, description of telnet, and introduction to port surfing
gtmhh1-2 Forging Email 101, and how to spot and track forgeries
gtmhh1-3 Elaboration on finger, and lesson on fingering through telnet
gtmhh1-4 How to fight Usenet spammers
gtmhh1-5 How to fight Email spammers
gtmhh1-6 How to get offensive web pages taken off the Web
Volume Two
gtmhh2-1 Introduction to the Internet and how it works
gtmhh2-2 Introduction to Linux
gtmhh2-3 Explanation of Win95 ping exploit, AKA "killer ping attack" and also just a basic introduction to ping
gtmhh2-4 Elaboration on port surfing, and definition of daemons
Volume Three
gtmhh3-1 How to keep from being Email bombed, and how to recover if you get bombed
gtmhh3-2 How to map the Internet
gtmhh3-3 How to protect yourself on IRC
Law Editions
Number One
Beginners Series
Number One
Number Two Hacking from/into wind0ze
Number Two Part Two
Number Two Part Three
Rainbow books
NCSC-TG-001 [Tan Book] A Guide to Understanding Audit in Trusted Systems [Version 2 6/01/88]
NCSC-TG-002 [Bright Blue Book] Trusted Product Evaluation - A Guide for Vendors [Version 1 3/1/88]
NCSC-TG-003 [Orange Book] A Guide to Understanding Discretionary Access Control in Trusted Systems [Version
1, 9/30/87]
NCSC-TG-004 [Aqua Book] Glossary of Computer Security Terms [Version 1, 10/21/88]
NCSC-TG-005 [Red Book] Trusted Network Interpretation [Version 1 7/31/87]
NCSC-TG-006 [Orange Book] A Guide to Understanding Configuration management in Trusted Systems [Version 1,
3/28/88]
NCSC-TG-007 [Burgundy Book] A Guide to Understanding Design Documentation in Trusted Systems
NCSC-TG-008 [Lavender Book] A Guide to Understanding Trusted Distribution in Trusted Systems [Version 1
12/15/88]
NCSC-TG-009 [Venice Blue Book] Computer Security Subsystem Interpretation of the Trusted Computer System
Evaluation Criteria
NCSC-TG-011 [Red Book] Trusted Network Interpretation Environments Guideline - Guidance for Applying the
Trusted Network Interpretation
NCSC-TG-013 [Pink Book] Rating Maintenance Phase Program Document
NCSC-TG-014 [Purple Book] Guidelines for Formal Verification Systems [4/1/89]
NCSC-TG-015 [Brown Book] A Guide to Understanding Trusted Facility Management [6/89]
NCSC-TG-016 [ Book] Writing Trusted Facility Manuals
NCSC-TG-017 [Light Blue Book] A Guide to Understanding Identification and Authentication in Trusted Systems
NCSC-TG-019 [Blue Book] Trusted Product Evaluation Questionnaire [Version 1, 10/16/89]
NCSC-TG-020A [Grey Book] Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List
Features for the UNIX System
NCSC-TG-021 [Lavender Book] Trusted Database Management System Interpretation
NCSC-TG-025 [Green Book] A Guide to Understanding Data Remanence in Automated Information Systems
NCSC-TG-026 [Peach Book] A Guide to Writing the Security Features User's Guide for Trusted Systems
Other NSA/NCSC Publications
NCSC DPL Degausser Products List [27 February 1989]
NCSC ETL Endorsed Tools List
NCSC OAS A Guideline on Office Automation Security [12/5/86]
National Security Agency Computer Security Documents Ordering information from the the National Security Agency
INFOSEC Awareness Office and the Government Printing Office and an order form.
NCSC C-Technical Report 32-92 The Design and Evaluation of INFOSEC Systems: The Computer Security
Contribution to the Composition Discussion
CSL BULLETIN DISPOSITION OF SENSITIVE AUTOMATED INFORMATION October 1992
Defense Department Rainbow Series
CSC-STD-001-83 [Orange Book] DOD Trusted Computer System Evaluation Criteria [DOD 5200.28]
CSC-STD-002-85 [Green Book] DoD Password Management Guidelines
CSC-STD-003-85 [Light Yellow Book] Guidance for Applying the DoD Trusted Computer System Evaluation Criteria
in Specific Environments
CSC-STD-004-85 [Yellow Book II] Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements
AOL Proggies
ICP final: Great!!
ICP Final Great Punter. Has a lot of methods. I mean a lot! Rating: 8 Password: ICP is Fucken GoD
PePsi4.0 Another great prog! A MUST DOWNLOAD! Rating:9 1/2
Pepsi 4.0 Great program almost as good as Fate
MiBFiNAL yet another site for this one
AOHell 1.16 Mb
AOLPRoGS BOARDs *Post Proggiez/Filez u need in here....
AOLPRoGS CHaT
Unix
Red Hat Linux
Debian
Slackware Linux
MkLinux (Linux for Macs)
The Unix Training Manual which the Government uses to train it's employees on Unix
Linux Installation HowTo
Linux FAQ
Linux Information Sheet
Windows95 Linux Boot Loader
Unix Guide For newbies, read it!
Beginner's Guide To Hacking UNIX
An Indepth Guide To Hacking UNIX
Hacking tips for UNIX A description of a few small hacks
Improving the Security of Your Site By Breaking Into It
A UNIX Hacking Tutorial One of the best UNIX tutorials out there
COPS & Robbers-UNIX System Security An outline of analyzing a UNIX system's security with the COPS program.
UNIX Security Checklist Outlines common errors in administration and general
Unix System V How to hack UNIX System V
UNIX Backdoors How to hold on to root.
Hacking UNIX Basic tutorial of UNIX security.
Bourne Programming A thorough shell programming manual.
Crash Course in X Windows Security Explains the security risks of X Windows including screen capturing.
The SMTP Protocol A complete description of the Simple Mail Transfer Protocol
Sendmail 8.6.4 Bug Security hole that allows user to get root shell
PHF Vulnerability
Unix Bible
A Guide to Hack Unix
Unix Guide For newbies, read it!
Hacking tips for UNIX A description of a few small hacks
Improving the Security of Your Site By Breaking Into It
A UNIX Hacking Tutorial One of the best UNIX tutorials out there
COPS & Robbers-UNIX System Security An outline of analyzing a UNIX system's security with the COPS program.
Hacking UNIX Basic tutorial of UNIX security.
Bourne Programming A thorough shell programming manual.
Crash Course in X Windows Security Explains the security risks of X Windows including screen capturing.
The SMTP Protocol A complete description of the Simple Mail Transfer Protocol
Sendmail 8.6.4 Bug Security hole that allows user to get root shell
Visual Basic Runtimes, DLLs, VBXs, etc
Visual Basic 5 Runtimes *YOU NEED THESE FILES FOR BOMBERS/NUKERS/ICQ NUKERS* Includes:
MSVBVM50.DLL, OLEPRO32.DLL, OLEAUT32.DLL, ASYCFILT.DLL, COMCAT.DLL, STDOLE2.TLB.
http://www.smart.is/pub/Runtime-dll-Vb1-4/VB4/?plain -- A library of VisBasic runtime .dll's which you'll need to run
UpYours! 2.0 and possibly some of the others. Don't get all of them--the program will tell you which ones you need
when you run it for the first time after installing it.
Misc. Hacking
Hacking Tools
AMI BIOS Cracker
Award BIOS v4.22 Password Calculator
AMI Decode
Crack AMI Bios
The Login Hacker: Final
The Phreak Master
Modem Signal Jammer-I can't guarantee that it will hide you though
BannanaCom - A killer very small dialup proggie for dialing into BBS's, etc.
An awesome Proggie written by some Haxors to emulate 33.6 bauds from a 28.8... It really works! Speeds up slower
modems in a lot of cases too...
HakTek Bad as fuck utilities
HAckUT Hacking Tools
Hide & Seek Hide files in GIF files and get them out again
Loops Explained
More on Trashing
Link Looker
PBX Scanner
NUA Scanner
Modem Jammer
Login Hacker
IP Host Scanner
Hack Pak
IP Scanner
Playback
Ethernet Packet Dumper
CodeHack
Narc v1.0
Zines
Phrack archive zines
40 Hex Magazine
Anarchy 'N' Explosives
The Art of Technology Digest
Activist Times Inc.
The BIOC Files
The Cult of the Dead Cow
Chalisti
Digital Free Press
Freakers Bureau Incorporated
Freedom
Informatik
Chaos Digest
The Legion of Doom Technical Journals
Legions of Lucifer
Miscellaneous Underground Files
N.A.R.C Newsletter
The New Fone Express
Network Information Access
National Security Anarchists
Phantasy Magzine
PHUN Magazine
Pirate Magazine
The Syndicate Report
United Phreakers Incorporated Newsletter
Vindicator Publications
The WorldView