1. Windows Hacking: Desktop Tools
1.1 Win2000 Nt
1.2 Registry Tools
1.3 Program Monitoring
1.4 Miscellanious
1.5 Keyboard Logger
1.6 Anonymous Email
1.7 Browser Monitoring
1.8 Ad And Banner Killer


2. Networking: IRC Tools
2.1 mIRC Tools
2.2 mIRC BOTS
2.3 mIRC Addon Scripts
2.4 XiRCON Scripts
2.5 Irc Chat Clients
2.6 BitchX Scripts


3. Trojans: Trojans Most Popular
3.1 Y3k Trojan
3.2 Undetected Trojan
3.3 SubSeven Trojan
3.4 Infector Trojan
3.5 DeepThroat Trojan
3.6 BioNet Trojan
3.7 Asylum Trojan


4. Trojans: Trojan Tools
4.1 Trojan Scanners
4.2 Trojan Cleaners
4.3 Trojan Archive
4.4 Packers
4.5 Notification Programs
4.6 EXE Binders
4.7 Droppers


5. Windows Hacking: Destructive Tools
5.1 Nukers
5.2 File Wiping
5.3 Email Bombz
5.4 Destructive Tools
5.5 Denial Of Service


6. Windows Hacking: Chat Tools
6.1 Yahoo 4.0
6.2 MSN Messenger
6.3 Icq Protection
6.4 Icq Nukers
6.5 Icq Exploits
6.6 Aim Exploits
6.7 AOL


7. Networking: Win Networking Tools
7.1   Telnet Clients
7.2   Spoofers
7.3   Sniffers
7.4   Proxy Server
7.5   Port Scanners
7.6   Port Listeners
7.7   Network Misc Tools
7.8   Network Exploit Tools
7.9   Netstat Monitor
7.10 Ip Scanners
7.11 Cgi Exploits
7.12 Cable DSL Tweaks
7.13 Bandwidth Monitors


8. Access and Privacy Control
8.1 Miscellaneous
8.2 Personal Firewalls
8.3 Privacy Tools


9. Anti-Cracking
9.1 Anti-cracking
9.2 Microsoft
9.3 Shockwave Flash Files crackers


10. Chat Systems: AOL - IRC - Miscellaneous - MSN
10.1 AOL
10.2 IRC
10.3 Miscellaneous
10.4 MSN


11. DOS and DDoS Tools
11.1 Denial of Service Flooders


12. General Hacker Choices and Tool kits
12.1 Security


13. ICQ: Encryption - Flooder and Bomber - Miscellaneous - Password -
UIN
13.1 Encryption
13.2 Flooder and Bomber
13.3 Miscellaneous
13.4 Password
13.5 UIN


14. Intrusion Detection
14.1 Miscellaneous


15. Network Auditing
15.1 Footprinting Utilities
15.2 HTTP Server Auditing Scanners
15.3 Multi Scanners (Cisco, SMTP, FTP, FXP, WinGate, more)
15.4 Netbios Utilities
15.5 Network FTP Scanners
15.6 Security Scanners
15.7 Sniffer/Analyzers
15.8 Vulnerability Scanners


16. Network Utilities
16.1 Download Managing
16.2 FTP Servers/Clients
16.3 Miscellaneous
16.4 Monitoring


17. Passwords
17.1 Archives password recovery
17.2 Miscellaneous Password Crackers
17.3 Windows Password Crackers


18. System Security Management
18.1 Data Recovery
18.2 Game utilities
18.3 Keylogger utilities
18.4 Miscellaneous
18.5 Registry
18.6 Registry utilities


19. Access Control
>> Firewalls Torn Apart
>> Guide to Social Engineering
>> Social Engineering and Email account cracking
>> Network Firewall Security
>> Hijacking Hotmail Accounts For Newbies
>> Various ways to hack or Over-ride FoolProof
>> Configuring ZoneAlarm Securely


20. Basics
>> IP Masquarding
>> Interesting Things You Didn't Know About Your PC's Hardware
>> Advanced Number Systems made easy
>> Hacking Dictionary
>> Hacking the bios.txt
>> DNS: the What, the How and the Why
>> Guide to inserting logo to System Properties
>> geographical Information using an IP Address
>> EMailer.txt
>> Installing a webserver for newbies Part II
>> TheIP_Adress.shtml
>> Being a Hacker
>> Well Known Port Numbers
>> Samba How to
>> port-numbers.txt
>> The OSI Model
>> Beginners step by step security guide
>> Linking Rules for Hacking and Other Alternative Websites
>> installing a webserver for newbies
>> Wireless Security & Hacking - By Dr.T
>> Wireless Networks
>> Exploiting design flaws in the Win32 API for privilege scalation
>> A complete guide to computers
>> Things you need
>> How to clear the past mapped network drives list
>> Telnet Explained [part 1] - By Abhisek Datta
>> dhdo.zip
>> Removing Banners (.doc)
>> Basics Of Cracking - by C0ldPhaTe
>> Unknown Source Hacking HAndbook
>> Windows keyboard shortcuts
>> Book-Hebrew.zip
>> Jargon Glossary (.doc)
>> Demystifying Remote Host by Abhisek Datta
>> Wireless LAN Technologies and WindowsXP
>> UnderstandingNetBIOS.zip


21. Chat Systems
>> MSNMessenger_getting_IPs.txt
>> MSN Tutorial


22. Cryptography
>> The Basics of Cryptography
>> PGP encryption for beginners
>> CryptoFAQ.txt
>> W2K_FileSystem.shtml
>> Basics to encryption
>> script_protecting.shtml
>> Breaking_ScriptEncoder.shtml
>> efs_vuln.shtml
>> Cryptography: Split Wide Open


23. Denial Of Service
>> BufferOverflow_Basics.shtml
>> Deadly DOS attack - by Abhisek Datta (.doc)
>> officexp.shtml
>> Introduction to Denial of Service
>> Introduction to Denial of Service
>> Deadly DOS attack - by Abhisek Datta (.doc)
>> Dos Attacks Explained - By Amin
>> winxp.pdf


24. Hacking Security Groups
>> HiverCon 2002
>> amadeusIII.zip
>> amadeusII.zip


25. Hardening Securing Papers
>> Closing open Holes
>> local-remote_security.shtml
>> hardenwin2kinstall.shtml
>> CDrom/index.html
>> Hardening BSD - by sil
>> securing9xme.shtml
>> Intrusion Prevention 101
>> apachesec.shtml
>> Basic Security - Windows 98
>> Securing IIS 5.0
>> Securing Exchange 2000, Part One
>> Setting up IIS and securing streamed content
>> Step by step guide to secure win2k
>> Tips on basic Linux server security
>> Risk Analysis N Assessment


26. ICQ
>> bible59.shtml
>> icq_hide_ip_howto.txt
>> icq_hide_ip.txt
>> hijack-icq.txt
>> The ICQ Security Tutorial
>> Backing up your ICQ contact list and settings
>> Hijackin ICQ Accounts (spanish)
>> ICQ Password Stealing Tutorial (aka How to shag UINÆs)
>> ICQ Password Securing Tutorial
>> Hijackin ICQ Accounts
>> Back Door Infecting Guide
>> ICQ_German.shtml
>> Get ICQ Passwords Using Share Programms
>> MiRC Explained by Haroon Ahmad


27. Intrusion Detection Systems
>> win2ksnort.shtml


28. IRC
>> eggdrop_bots.shtml
>> proper_way_of_fserv.shtml
>> Getting Passwords Of Nicks In mIRC
>> IRCspoofing.shtml
>> warfare.shtml
>> Irc Commands- By LaZy
>> IRC Einf?hrung (german)
>> IRC Trading Security v1.1
>> How to bypass most of the bans in irc
>> Basic IRC commands
>> IRC-Takeover.txt
>> Never Be Banned In IRC
>> IRC security FAQ.html


29. Miscellaneous
>> A better way
>> How to disable keyloggers
>> Secure Folders - By ?ú ÷±d L?m?tº
>> Control Panel trick
>> ASCII Folder Deletion
>> How to hack hotmail passwords
>> Exploring Windows - misc windows tricks
>> Logon Message
>> MSN messenger Tip
>> Writing to the MBR - By Harshal
>> Trick on CNN.com
>> Access the blocked folder in winnt
>> Various Methods Of Hacking Hotmail
>> Writing Bootable CD's with Nero
>> Windows (misc OS) Tricks
>> Windows XP Tricks
>> No more PopUps
>> Tips and tricks on burning
>> hacking BIPAC-711 ADSL router
>> Protecting Files/Folders in Windows
>> The elite symbols
>> Windows XP Product Key Modifier
>> Hacking Hotmail
>> Miscellaneous Kazaa tricks
>> How to change the sound files in Trillian
>> kazza.zip
>> Unhide Folders - By sanjeev
>> The elite symbols
>> Defacing Websites - By Abhisek Datta
>> Simple File/Folder Protection
>> XP Tips - By ANKIT


30. Network Auditing Secuirty Penetration
>> Using FZC to Crack Password-Protected Zip Files
>> Exploiting Cisco Systems
>> Cracking Unix Password files for Beginners
>> Poor Security on Default Win2k Server Installation
>> Remote control of IIS
>> HowTo_become_hacker.shtml
>> Postal Nemesis v1.0 BETA
>> Detailed Text about the sam file
>> Gathering Info on a Host
>> What system Administrators fear
>> killahdragon.txt
>> Buffer Overflows - Tutorial in German
>> Bug in PostNuke 0.62, 0.63 and 0.64 (and possibly PHPnuke)
>> Munga Bunga's HTTP Brute Forcer
>> Nettools.txt
>> Manufacturers default Passwords
>> Manufacturers default Passwords
>> Port Scanning: Is it illegal?
>> Microsoft IIS local and remote DoS
>> fingerprint-port80.txt
>> Hacking with netbios - By Gaurav Kumar
>> Languard Network scanner Basics, By Virus1824 - for beginners
>> IIS allows universal CrossSiteScripting
>> All versions of Microsoft IIS Remote buffer overflow (SYSTEM Level Access)
>> Simple Guide for opening files locked by PC Security
>> Getting through an access database password
>> shell.shtml
>> Admin access in a locked environment
>> The Info Gathering Tutorial
>> Introduction to Buffer Overflow
>> Using nbstat/netbios to your advantage
>> Buffer overflows-getting started
>> Default password paths
>> Default password paths
>> Netbios Tutorial
>> Format String exploits - in english and german
>> Unchecked Buffer in ISAPI Extension Could Enable Compromise of IIS 5.0 Server
>> Penetration Testing
>> hotmail_javascript_bypass.zip
>> hijaking hotmail passwords
>> X-ForceÖ Vulnerability Disclosure Guidelines .pdf


31. Online Privacy
>> Anonymity Tutorial
>> nsa.shtml
>> Wingate_Proxy.shtml
>> Etre anonyme sur Internet
>> Send mails anonymly


32. Operating Systems
>> introduction to Webmin
>> Exploiting_IPC_Share.shtml
>> Cryptic_WindowsErrors.shtml
>> Fun_With_Debug.shtml
>> what_is_the_NTregistry.shtml
>> Untold_Secrets .shtml
>> beginnersguide.shtml
>> another_registry.shtml
>> file_and_printsharing.shtml
>> SharingHiddenDrives.txt
>> win98security.shtml
>> Policy editor
>> CREATING FILES IN WINDOWS THAT BEGIN WITH A DOT (PERIOD)
>> Creating Hidden Folders without filenames
>> Remote OS detection
>> Unaccessible_Directories.txt
>> win2k-ipc.shtml
>> Hackin-Cracking IIS 4/5
>> Hacking with msDOS - By milind
>> Hack XP admin passwords
>> Guide to Win2kX NET Commands
>> Unaccessible_Directories - Reflectia-X's addition
>> Generel Bugs In IIS 4-5-5.01
>> Installing apache on windows
>> Installing_2K.shtml
>> BackLogo.txt
>> Foolproof.shtml
>> Fooling Foolproof
>> Linux eine kleine Einf?hrung
>> mshidden.txt
>> How to make simple DOS Batchfiles
>> Windows (misc OS) Tricks
>> Windows XP Tricks
>> Defeat_Foolproof .shtml
>> OutlookXPsecurity.shtml
>> Running Programs trough the [Run] feature
>> Why OpenBSD will never be as secure as Linux
>> Basic security on Windows ME
>> A Review of lindows
>> 95-98_Local_Hacking.shtml
>> XPactivation.shtml
>> WinLogoChange.txt
>> What's New for the Windows 98 Startup Disk?
>> OfficeXP_outlook.shtml
>> Advanced DOS techniques by ½phacination?
>> Windows File/Printer Sharing explained
>> IIS Unicode Tutorial - By Lucky
>> Useful DOS commands (mainly for newbies)
>> Hacking the hash
>> Real Desktop Items, not Shortcuts
>> Microsoft Explorer html-based folders
>> access to other restricted users folders in WinXP/2K
>> Common files of the /etc directory and their uses
>> Writing your own operating system
>> MS Windows 2000 TCP/IP Implementation Details
>> Hiding Things From Other Windows Users
>> Changing Startup/Shutdown Logos
>> Linux security for newbies
>> NetBIOS Vulnerability By Rishabh ?ara
>> WHAT Will Microsoft Think Windows Exposed
>> Windows hacking
>> Windows XP explained by Abhisek Datta
>> Unaccessible DIRs/FILES from [another method]
>> Look someones Desktop in WinXP
>> Why Linux will never be as secure as OpenBSD
>> Hack into Windows Network by Chris Zhang
>> Microsoft IIS Unicode Exploit Explained .doc
>> personalize_linux.zip
>> uFolder.zip
>> MazBTE.zip
>> Windows XP Security -m0ose
>> Reliability Improvements in WindowsXP-m0ose
>> Registry Tweaking - By Indianzz
>> Windows XP and Net -m0ose
>> How to make your XP bootable


33. Protocols
>> sendmail_Tips_and_Tricks.shtml
>> What is the pop Protocol
>> sendmail_holes.shtml
>> tcp-ip_for_newbies.shtml
>> sendmail_tutorial.shtml
>> The FTP Tutorial by Spiderman
>> The FTP Tutorial
>> Simple Finger Deamon Tutorial by Paris2K
>> Fakemail.shtml
>> TCPwrapper.shtml
>> TRACING-IP.zip


34. Software Cracking
>> Register Modfying
>> Cracking Customizer 2000 for w9x/me ver. 6.5.3
>> Cracking Sweet little piano
>> New tech hacks crack
>> Skyscape.txt
>> The Cracking Tutorial Part 1
>> The Cracking Tutorial Part 2
>> Illegal XP owners beware, Microsoft has quite a suprise planned
>> Newbies first class
>> Introduction to Reverse Engineering v.09
>> Cracking-Unix-Password-File.zip
>> patching Starr internet and pc monitor


For more information, you can visit our website at : http://www.ilmuhacker.com

Best regards,

ilmuhacker.com


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Algorithm Geeks" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at http://groups.google.com/group/algogeeks
-~----------~----~----~----~------~----~------~--~---

Reply via email to