- Viaje 9 Dias Nueva York
- Viaje Japanese Cigar
- Viaje Que Es
- Lifestyle Publications
- Lifestyle Zoom
- Curiosidades Legais
- Viaje Birthday Blend 2020
- What Lifestyle Causes Cancer
- Curiosidades How To Get Away With A Murderer
- For Lifestyle In French
- Viaje Zombie Farmer Bill Hatchet
- Curiosidades 50 Sombras Mas Oscuras
- Curiosidades Vis A Vis
- Curiosidades Keanu Reeves
- Curiosidades Forrest Gump
- Curiosidades Zanahoria
- Curiosidades Xbox One S
- Lifestyle 12 Series Ii System
- Curiosidades 365 Dni
- Viaje Ghost Rider
- Lifestyle 5Th Wheel
- Viaje Kenia Y Zanzibar Precio
- Lifestyle Awareness Tea
- Curiosidades Juegos Olimpicos
- Curiosidades Fisica
- Viaje Largo Acordes
- Lifestyle News
- Viaje Interprovincial Ecuador
- Lifestyle Song
- Viaje Redondo Pelicula Completa
- How Many Lifestyle Sports Shops In Ireland
- Curiosidades 101 Dalmatas
- Viajar Vs Ca Case Digest
- Curiosidades 9 Semanas Y Media
- Curiosidades Biblicas
- Curiosidades Sangre 0 Negativo
- Curiosidades Xalmimilulco 2020
- Lifestyle 127
- Viaje Virtual A Tierra Santa
- Curiosidades How I Met Your Mother
- Lifestyle Fitness
- Lifestyle Download
- Viaje Uzbekistan Politours
- Viaje Tripulado A Marte
- Lifestyle 10
- Curiosidades E Dicas
- Curiosidades Uruguay
- How To Say Viaje In Spanish
- Curiosidades Zanahoria
- Curiosidades Xalmimilulco
- Curiosidades Biblicas
- Lifestyle Garden Aruba
- Lifestyle Rich Gang
- Who Lifestyle Related Disease
- Curiosidades Alien Vs Predator
- Curiosidades Harry Potter
- Lifestyle Centre
- 66 Curiosidades De La India
- Cuota 0 Viaje Egresados
- Curiosidades 10
- Wiki How Viaje
- Curiosidades 13 Reason Why
- Lifestyle Vacation Club
- Lifestyle Medicine Certification
- Viaje Por El Mundo
- Viaje Oro Perfecto
- Lifestyle Without Barriers
- Curiosidades Gta V
- Lifestyle Websites Like Goop
- Viaje Riviera Maya
- Viaje Tnt
- Viaje Verde Lyrics
- Curiosidades The 100
- Curiosidades Del Numero 0
- Curiosidades 777
- Lifestyle Stores Like Urban Outfitters
- Curiosidades India
- Viaje Interior
- Curiosidades Outer Banks
- Viaje 3 Pelicula
- Viaje Virtual A Machu Picchu
- Lifestyle 180
- Lifestyle Trader
- Viaje Ricardo Arjona
- Lifestyle Blogs
- Curiosidades Now United
- Viaje Meaning
- Are Lifestyle Diseases Preventable
- 01 Viaje Al Centro De La Tierra
- Lifestyle Lyrics Amrit Maan
- Lifestyle Furniture
- Curiosidades En El Mundo
- Lifestyle Begumpet
- Viaje 2 La Isla Misteriosa Cast
- Can Lifestyle Vouchers Be Used Online
- Lifestyle Gift Card
- For Lifestyle Meaning
- Lifestyle 50
- Curiosidades Kim Jong Un
- How To Say Viaje In English
- Lifestyle Of The Rich And Famous
- Viaje Feminine Or Masculine Spanish
- Lifestyle 30
- Lifestyle Jewelry
- How To Say Viaje In Spanish
- Curiosidades 2019
- Will Lifestyle Store Near Me
- What Lifestyle Choices Cause Diabetes
- Why Lifestyle Changes Are Important
- Viaje Farmer Bill Hatchet
- Curiosidades Do Can
- Curiosidades Barcelona
- Viaje Tiempo Atras Letra
- Viaje 2 Actores
- Viaje 6 Dias Polonia
- Viaje Mais
- Lifestyle Campers
- Curiosidades 9
- Viaje Del Cliente
- Will Lifestyle Online Shopping
- Lifestyle Video Ideas
- Lifestyle Influencers
- Curiosidades Ford Vs Ferrari
- Lifestyle 360 Program
- Lifestyle Definition
- Lifestyle Qatar
- Lifestyle Parow
- Viaje Virtual A La Luna
- Viaje Jet
- Lifestyle Gym Equipment
- Lifestyle Publications
- Why Nirmal Lifestyle Mulund Closed
- Viaje Coche Fase 0
- Where Is Lifestyle Christianity Located
- Verb For Viaje
- Where Is Lifestyle Located
- Curiosidades Outer Banks
- Curiosidades 5G
- Viaje 7 Dias Europa
- What Is Curiosidades Mean In English
- Lifestyle 76 Cabinet
- Lifestyle Synonym
- Lifestyle Logo
- Viaje De Chihiro
- Curiosidades Futebol
- Curiosidades Geografia
- Curiosidades Bolivia
- Lifestyle 7-In-1 Desktop Game Set
- Viaje Way
- Is Lifestyle Sports Irish
- Viaje 8 Dias Escocia
- Lifestyle With 200K Salary
- Viaje Hamaki
- Lifestyle News
- Curiosidades Biologia
- Lifestyle 28 Bose
- Viaje 5Th Anniversary
- Viaje Gratis Uber
- Lifestyle 180
- Lifestyle When Pregnant
- Lifestyle 535 Series Iii
- Viaje Juntos 2018
- Viaje 3 Dias Europa
- How Lifestyle Affects Business
- How Lifestyle Affects Aging
- Viaje Ou Viaje
- Lifestyle Villages
- How Many Lifestyle Blocks In Nz
- Curiosidades How I Met Your Mother
Tuesday, June 30, 2020
ENLACE A TRAVÉS DEL CUAL SE PODRÁ SEGUIR EN DIRECTO LA IMPOSICIÓN DE LAS MEDALLAS AL MÉRITO POLICIAL CON DISTINTIVO BLANCO A 10 AGENTES LOCALES.
18 Best Hacking Websites to Learn Ethical Hacking From Basic 2018
- SecTools.Org: List of 75 security tools based on a 2003 vote by hackers.
- Hakin9: E-magazine offering in-depth looks at both attack and defense techniques and concentrates on difficult technical issues.
- Hacked Gadgets: A resource for DIY project documentation as well as general gadget and technology news.
- DEFCON: Information about the largest annual hacker convention in the US, including past speeches, video, archives, and updates on the next upcoming show as well as links and other details.
- NFOHump: Offers up-to-date .NFO files and reviews on the latest pirate software releases.
- Makezine: Magazine that celebrates your right to tweak, hack, and bend any technology to your own will.
- Packet Storm: Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers.
- Offensive Security Training: Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course.
- HackRead: HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance, and Hacking News with full-scale reviews on Social Media Platforms.
- KitPloit: Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security.
- Hackaday: A hardware hack every day.
- Metasploit: Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the worlds best penetration testing software now.
- Phrack Magazine: Digital hacking magazine.
- Hack Forums: Emphasis on white hat, with categories for hacking, coding and computer security.
- The Hacker News: The Hacker News — most trusted and widely-acknowledged online cyber security news magazine with in-depth technical coverage for cybersecurity.
- Black Hat: The Black Hat Briefings have become the biggest and the most important security conference series in the world by sticking to our core value: serving the information security community by delivering timely, actionable security information in a friendly, vendor-neutral environment.
- SecurityFocus: Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
- Exploit DB: An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
re: How to remove a site from top 10 for important keywords
http://www.blackhat.to
Friday, June 26, 2020
re: Additional Details
After checking your website SEO metrics and ranks, we determined
that you can get a real boost in ranks and visibility by using
aour 49 usd / Economy Plan:
https://www.hilkom-digital.com/product/economy-seo-plan/
cheap and effective SEO plan
onpage SEO included
thank you
Mike
Thursday, June 11, 2020
Top 10 Most Popular Ethical Hacking Tools (2019 Ranking)
Top 10 powerful Hacking Tools in 2019.
If hacking is performed to identify the potential threats to a computer or network then it will be an ethical hacking.
Ethical hacking is also called penetration testing, intrusion testing, and red teaming.
Hacking is the process of gaining access to a computer system with the intention of fraud, data stealing, and privacy invasion etc., by identifying its weaknesses.
Ethical Hackers:
A person who performs the hacking activities is called a hacker.
There are six types of hackers:
- The Ethical Hacker (White hat)
- Cracker
- Grey hat
- Script kiddies
- Hacktivist
- Phreaker
A security professional who uses his/her hacking skills for defensive purposes is called an ethical hacker. To strengthen the security, ethical hackers use their skills to find vulnerabilities, document them, and suggest the ways to rectify them.
Companies that provide online services or those which are connected to the internet, must perform penetration testing by ethical hackers. Penetration testing is another name of ethical hacking. It can be performed manually or through an automation tool.
Ethical hackers work as an information security expert. They try to break the security of a computer system, network, or applications. They identify the weak points and based on that, they give advice or suggestions to strengthen the security.
Programming languages that are used for hacking include PHP, SQL, Python, Ruby, Bash, Perl, C, C++, Java, VBScript, Visual Basic, C Sharp, JavaScript, and HTML.
Few Hacking Certifications include:
Let's Explore!!
#1) Nmap

Price: Free
Description:
Nmap is a security scanner, port scanner, as well as a network exploration tool. It is an open source software and is available for free.
It supports cross-platform. It can be used for network inventory, managing service upgrade schedules, and for monitoring host & service uptime. It can work for a single host as well as large networks. It provides binary packages for Linux, Windows, and Mac OS X.
Features:
- Nmap suite has:
- Data transfer, redirection, and debugging tool(Ncat),
- Scan results comparing utility(Ndiff),
- Packet generation and response analysis tool (Nping),
- GUI and Results viewer (Nping)
- Using raw IP packets it can determine:
- The available hosts on the network.
- Their services offered by these available hosts.
- Their OS.
- Packet filters they are using.
- And many other characteristics.
Best for: Nmap is best for scanning network. It is easy to use and fast as well.
Website: Nmap
******************
#2) Netsparker

******************
#3) Acunetix

Acunetix is a fully automated ethical hacking tool that detects and reports on over 4500 web application vulnerabilities including all variants of SQL Injection and XSS.
The Acunetix crawler fully supports HTML5 and JavaScript and Single-page applications, allowing auditing of complex, authenticated applications.
It bakes in advanced Vulnerability Management features right-into its core, prioritizing risks based on data through a single, consolidated view, and integrating the scanner's results into other tools and platforms.
=> Visit Acunetix Official Website
******************
#4) Metasploit

Price: Metasploit Framework is an open source tool and it can be downloaded for free. Metasploit Pro is a commercial product. Its free trial is available for 14 days. Contact the company to know more about its pricing details.
Description:
It is the software for penetration testing. Using Metasploit Framework, you can develop and execute exploit code against a remote machine. It supports cross-platform.
Features:
- It is useful for knowing about security vulnerabilities.
- Helps in penetration testing.
- Helps in IDS signature development.
- You can create security testing tools.
Best For Building anti-forensic and evasion tools.
Website: Metasploit
#5) Aircrack-Ng

Price: Free
Description:
Aircrack-ng provides different tools for evaluating Wi-Fi network security.
All are command line tools. For Wi-Fi security, it focuses on monitoring, attacking, testing, and cracking. It supports Linux, Windows, OS X, Free BSD, NetBSD, OpenBSD, Solaris, and eComStation 2.
Features:
- Aircrack-ng can focus on Replay attacks, de-authentication, fake access points, and others.
- It supports exporting data to text files.
- It can check Wi-Fi cards and driver capabilities.
- It can crack WEP keys and for that, it makes use of FMS attack, PTW attack, and dictionary attacks.
- It can crack WPA2-PSK and for that, it makes use of dictionary attacks.
Best For: Supports any wireless network interface controller.
Website: Aircrack-Ng
#6) Wireshark

Price: Free
Description:
Wireshark is a packet analyzer and can perform deep inspection of many protocols.
It supports cross-platform. It allows you to export the output to different file formats like XML, PostScript, CSV, and Plaintext. It provides the facility to apply coloring rules to packet list so that analysis will be easier and quicker. The above image will show the capturing of packets.
Features:
- It can decompress the gzip files on the fly.
- It can decrypt many protocols like IPsec, ISAKMP, and SSL/TLS etc.
- It can perform live capture and offline analysis.
- It allows you to browse the captured network data using GUI or TTY-mode TShark utility.
Best For: Analyzing data packets.
Website: Wireshark
#7) Ettercap

Price: Free.
Description:
Ettercap supports cross-platform. Using Ettercap's API, you can create custom plugins. Even with the proxy connection, it can do sniffing of HTTP SSL secured data.
Features:
- Sniffing of live connections.
- Content filtering.
- Active and passive dissection of many protocols.
- Network and host analysis.
Best For: It allows you to create custom plugins.
Website: Ettercap
#8) Maltego

Price: The Community version, Maltego CE is available for free. Price for Maltego Classic is $999. Price for Maltego XL is $1999. These two products are for the desktop. Price for the server products like CTAS, ITDS, and Comms starts at $40000, which includes training as well.
Description:
Maltego is a tool for link analysis and data mining. It supports Windows, Linux, and Mac OS.
For the discovery of data from open sources and visualizing the information in graphical format, it provides the library of transforms. It performs real-time data-mining and information gathering.
Features:
- Represents the data on node-based graph patterns.
- Maltego XL can work with large graphs.
- It will provide you the graphical picture, thereby telling you about the weak points and abnormalities of the network.
Best For: It can work with very large graphs.
Website: Maltego
#9) Nikto

Price: Free
Description:
Nikto is an open source tool for scanning the web server.
It scans the web server for dangerous files, outdated versions, and particular version related problems. It saves the report in a text file, XML, HTML, NBE, and CSV file formats. Nikto can be used on the system which supports basic Perl installation. It can be used on Windows, Mac, Linux, and UNIX systems.
Features:
- It can check web servers for over 6700 potentially dangerous files.
- It has full HTTP proxy support.
- Using Headers, favicons, and files, it can identify the installed software.
- It can scan the server for outdated server components.
Best For: As a Penetration Testing tool.
Website: Nikto
#10) Burp Suite

Price: It has three pricing plans. Community edition can be downloaded for free. Pricing for Enterprise edition starts at $3999 per year. Price of the Professional edition starts at $399 per user per year.
Description:
Burp Suite has a web vulnerability scanner and has advanced and essential manual tools.
It provides many features for web application security. It has three editions, community, enterprise, and professional. With community editions, it provides essential manual tools. With the paid versions it provides more features like Web vulnerabilities scanner.
Features:
- It allows you to schedule and repeats the scan.
- It scans for 100 generic vulnerabilities.
- It uses out-of-band techniques (OAST).
- It provides detailed custom advisory for the reported vulnerabilities.
- It provides CI Integration.
Best For: Security testing.
Website: Burp Suite
#11) John The Ripper

Price: Free
Description:
John the Ripper is a tool for password cracking. It can be used on Windows, DOS, and Open VMS. It is an open source tool. It is created for detecting weak UNIX passwords.
Features:
- John the Ripper can be used to test various encrypted passwords.
- It performs dictionary attacks.
- It provides various password crackers in one package.
- It provides a customizable cracker.
Best For: It is fast in password cracking.
Website: John the Ripper
#12) Angry IP Scanner

Price: Free
Description:
Angry IP Scanner is a tool for scanning the IP addresses and ports. It can scan both on local network and Internet. It supports Windows, Mac, and Linux operating systems.
Features:
- It can export the result in many formats.
- It is a command-line interface tool.
- It is extensible with many data fetchers.
Website: Angry IP Scanner
Conclusion
As explained here, Nmap is used for computer security and network management. It is good for scanning the network. Metasploit is also for security and is good for building anti-forensic and evasion tools.
Aircrack-Ng is a free packet sniffer & injector and supports cross-platform. Wireshark is a packet analyzer and is good in analyzing data packets. As per the reviews available online, people recommend using Nmap instead of Angry IP scanner as Angry IP Scanner comes with unwanted applications.
John the Ripper is fast in password cracking. Nikto is a good open source tool for penetration testing. Maltego presents the data in a graphical form and will give you information about weak points and abnormalities.
This was all about the ethical hacking and the top ethical hacking tools. Hope you will find this article to be much useful!!
@EVERYTHING NT
Related posts
CEH: Identifying Services & Scanning Ports | Gathering Network And Host Information | NMAP
CEH scanning methodology is the important step i.e. scanning for open ports over a network. Port is the technique used to scan for open ports. This methodology performed for the observation of the open and close ports running on the targeted machine. Port scanning gathered a valuable information about the host and the weakness of the system more than ping sweep.
Network Mapping (NMAP)
Basically NMAP stands for Network Mapping. A free open source tool used for scanning ports, service detection, operating system detection and IP address detection of the targeted machine. Moreover, it performs a quick and efficient scanning a large number of machines in a single session to gathered information about ports and system connected to the network. It can be used over UNIX, LINUX and Windows.There are some terminologies which we should understand directly whenever we heard like Open ports, Filtered ports and Unfiltered ports.
Open Ports means the target machine accepts incoming request on that port cause these ports are used to accept packets due to the configuration of TCP and UDP.
Filtered ports means the ports are usually opened but due to firewall or network filtering the nmap doesn't detect the open ports.
Unfiltered means the nmap is unable to determine whether the port is open or filtered while the port is accessible.
Types Of NMAP Scan
| Scan Type | Description |
|---|---|
| Null Scan | This scan is performed by both an ethical hackers and black hat hackers. This scan is used to identify the TCP port whether it is open or closed. Moreover, it only works over UNIX based systems. |
| TCP connect | The attacker makes a full TCP connection to the target system. There's an opportunity to connect the specifically port which you want to connect with. SYN/ACK signal observed for open ports while RST/ACK signal observed for closed ports. |
| ACK scan | Discovering the state of firewall with the help ACK scan whether it is stateful or stateless. This scan is typically used for the detection of filtered ports if ports are filtered. Moreover, it only works over the UNIX based systems. |
| Windows scan | This type of scan is similar to the ACK scan but there is ability to detect an open ports as well filtered ports. |
| SYN stealth scan | This malicious attack is mostly performed by attacker to detect the communication ports without making full connection to the network. This is also known as half-open scanning. |
All NMAP Commands
| Commands | Scan Performed |
|---|---|
| -sT | TCP connect scan |
| -sS | SYN scan |
| -sF | FIN scan |
| -sX | XMAS tree scan |
| -sN | Null scan |
| -sP | Ping scan |
| -sU | UDP scan |
| -sO | Protocol scan |
| -sA | ACK scan |
| -sW | Window scan |
| -sR | RPC scan |
| -sL | List/DNS scan |
| -sI | Idle scan |
| -Po | Don't ping |
| -PT | TCP ping |
| -PS | SYN ping |
| -PI | ICMP ping |
| -PB | ICMP and TCP ping |
| -PB | ICMP timestamp |
| -PM | ICMP netmask |
| -oN | Normal output |
| -oX | XML output |
| -oG | Greppable output |
| -oA | All output |
| -T Paranoid | Serial scan; 300 sec between scans |
| -T Sneaky | Serial scan; 15 sec between scans |
| -T Polite | Serial scan; .4 sec between scans |
| -T Normal | Parallel scan |
| -T Aggressive | Parallel scan, 300 sec timeout, and 1.25 sec/probe |
| -T Insane | Parallel scan, 75 sec timeout, and .3 sec/probe |
How to Scan
You can perform nmap scanning over the windows command prompt followed by the syntax below. For example, If you wanna scan the host with the IP address 192.168.2.1 using a TCP connect scan type, enter this command:nmap 192.168.2.1 –sT
nmap -sT 192.168.2.1
Continue reading
CEH: Identifying Services & Scanning Ports | Gathering Network And Host Information | NMAP
CEH scanning methodology is the important step i.e. scanning for open ports over a network. Port is the technique used to scan for open ports. This methodology performed for the observation of the open and close ports running on the targeted machine. Port scanning gathered a valuable information about the host and the weakness of the system more than ping sweep.
Network Mapping (NMAP)
Basically NMAP stands for Network Mapping. A free open source tool used for scanning ports, service detection, operating system detection and IP address detection of the targeted machine. Moreover, it performs a quick and efficient scanning a large number of machines in a single session to gathered information about ports and system connected to the network. It can be used over UNIX, LINUX and Windows.There are some terminologies which we should understand directly whenever we heard like Open ports, Filtered ports and Unfiltered ports.
Open Ports means the target machine accepts incoming request on that port cause these ports are used to accept packets due to the configuration of TCP and UDP.
Filtered ports means the ports are usually opened but due to firewall or network filtering the nmap doesn't detect the open ports.
Unfiltered means the nmap is unable to determine whether the port is open or filtered while the port is accessible.
Types Of NMAP Scan
| Scan Type | Description |
|---|---|
| Null Scan | This scan is performed by both an ethical hackers and black hat hackers. This scan is used to identify the TCP port whether it is open or closed. Moreover, it only works over UNIX based systems. |
| TCP connect | The attacker makes a full TCP connection to the target system. There's an opportunity to connect the specifically port which you want to connect with. SYN/ACK signal observed for open ports while RST/ACK signal observed for closed ports. |
| ACK scan | Discovering the state of firewall with the help ACK scan whether it is stateful or stateless. This scan is typically used for the detection of filtered ports if ports are filtered. Moreover, it only works over the UNIX based systems. |
| Windows scan | This type of scan is similar to the ACK scan but there is ability to detect an open ports as well filtered ports. |
| SYN stealth scan | This malicious attack is mostly performed by attacker to detect the communication ports without making full connection to the network. This is also known as half-open scanning. |
All NMAP Commands
| Commands | Scan Performed |
|---|---|
| -sT | TCP connect scan |
| -sS | SYN scan |
| -sF | FIN scan |
| -sX | XMAS tree scan |
| -sN | Null scan |
| -sP | Ping scan |
| -sU | UDP scan |
| -sO | Protocol scan |
| -sA | ACK scan |
| -sW | Window scan |
| -sR | RPC scan |
| -sL | List/DNS scan |
| -sI | Idle scan |
| -Po | Don't ping |
| -PT | TCP ping |
| -PS | SYN ping |
| -PI | ICMP ping |
| -PB | ICMP and TCP ping |
| -PB | ICMP timestamp |
| -PM | ICMP netmask |
| -oN | Normal output |
| -oX | XML output |
| -oG | Greppable output |
| -oA | All output |
| -T Paranoid | Serial scan; 300 sec between scans |
| -T Sneaky | Serial scan; 15 sec between scans |
| -T Polite | Serial scan; .4 sec between scans |
| -T Normal | Parallel scan |
| -T Aggressive | Parallel scan, 300 sec timeout, and 1.25 sec/probe |
| -T Insane | Parallel scan, 75 sec timeout, and .3 sec/probe |
How to Scan
You can perform nmap scanning over the windows command prompt followed by the syntax below. For example, If you wanna scan the host with the IP address 192.168.2.1 using a TCP connect scan type, enter this command:nmap 192.168.2.1 –sT
nmap -sT 192.168.2.1
Related posts
An Overview Of Exploit Packs (Update 25) May 2015
Update May 12, 2015
Added CVE-2015-0359 and updates for CVE-2015-0336
Update February 19, 2015
Added Hanjuan Exploit kit and CVE-2015-3013 for Angler
| http://www.kahusecurity.com |
Added CVE-2015-3010, CVE-2015-3011 for Agler and a few reference articles.
If you notice any errors, or some CVE that need to be removed (were retired by the pack authors), please let me know. Thank you very much!
Update December 12, 2014
This is version 20 of the exploit pack table - see the added exploit packs and vulnerabilities listed below.
| Exploit Pack Table Update 20 |
|---|
| Click to view or download from Google Apps |
I want to give special thanks to Kafeine L0NGC47, Fibon and Curt Shaffer for their help and update they made. Note the new Yara rules sheet / tab for yara rules for exploit kit.
I also want to thank Kahu security, Kafeine, Malforsec and all security companies listed in References for their research.
If you wish to be a contributor (be able to update/change the exploits or add yara rules), please contact me :)
If you have additions or corrections, please email, leave post comments, or tweet (@snowfl0w) < thank you!
The Wild Wild West image was created by Kahu Security - It shows current and retired (retiring) kits.
List of changed kits| Gong Da / GonDad | Redkit 2.2 | x2o (Redkit Light) | Fiesta (=Neosploit) | Cool Styxy | DotkaChef | |
|---|---|---|---|---|---|---|
| CVE-2011-3544 | CVE-2013-2551 | CVE-2013-2465 | CVE-2010-0188 | CVE-2010-0188 | CVE-2012-5692 | |
| CVE-2012-0507 | CVE-2013-2471 | CVE-2013-0074/3896 | CVE-2011-3402 | CVE-2013-1493 | ||
| CVE-2012-1723 | CVE-2013-1493 | CVE-2013-0431 |
| CVE-2013-2423 | ||
| CVE-2012-1889 | CVE-2013-2460 | CVE-2013-0634 | CVE-2013-1493 | |||
| CVE-2012-4681 | CVE-2013-2551 | CVE-2013-2423 | ||||
| CVE-2012-5076 | ||||||
| CVE-2013-0422 | ||||||
| CVE-2013-0634 | ||||||
| CVE-2013-2465 |
| Angler | FlashPack = SafePack | White Lotus | Magnitude (Popads) | Nuclear 3.x | Sweet Orange |
|---|---|---|---|---|---|
| CVE-2013-0074/3896 | CVE-2013-0074/3896 | CVE-2011-3544 | CVE-2011-3402 | CVE-2010-0188 | CVE-2013-2423 |
| CVE-2013-0634 | CVE-2013-2551 | CVE-2013-2465 | CVE-2012-0507 | CVE-2012-1723 | CVE-2013-2471 |
| CVE-2013-2551 | CVE-2013-2551 | CVE-2013-0634 | CVE-2013-0422 | CVE-2013-2551 | |
| CVE-2013-5329 | CVE-2013-2460 | CVE-2013-2423 | |||
| CVE-2013-2471 ?? | CVE-2013-2471 | CVE-2013-2460 | |||
| CVE-2013-2551 | CVE-2013-2551 |
| CK | HiMan | Neutrino | Blackhole (last) | Grandsoft | Private EK |
|---|---|---|---|---|---|
| CVE-2011-3544 | CVE-2010-0188 | CVE-2013-0431 | CVE-2013-0422 | CVE-2010-0188 | CVE-2006-0003 |
| CVE-2012-1889 | CVE-2011-3544 | CVE-2013-2460 | CVE-2013-2460 | CVE-2011-3544 | CVE-2010-0188 |
| CVE-2012-4681 | CVE-2013-0634 | CVE-2013-2463* | CVE-2013-2471 | CVE-2013-0422 | CVE-2011-3544 |
| CVE-2012-4792* | CVE-2013-2465 | CVE-2013-2465* | and + all or some | CVE-2013-2423 | CVE-2013-1347 |
| CVE-2013-0422 | CVE-2013-2551 | CVE-2013-2551 | exploits | CVE-2013-2463 | CVE-2013-1493 |
| CVE-2013-0634 | * switch 2463*<>2465* | from the previous | CVE-2013-2423 | ||
| CVE-2013-3897 | Possibly + exploits | version | CVE-2013-2460 | ||
| * removed | from the previous | ||||
| version |
| Sakura 1.x | LightsOut | Glazunov | Rawin | Flimkit | Cool EK (Kore-sh) | Kore (formely Sibhost) |
|---|---|---|---|---|---|---|
| cve-2013-2471 | CVE-2012-1723 | CVE-2013-2463 | CVE-2012-0507 | CVE-2012-1723 | CVE-2013-2460 | CVE-2013-2423 |
| CVE-2013-2460 | CVE-2013-1347 | cve-2013-2471 | CVE-2013-1493 | CVE-2013-2423 | CVE-2013-2463 | CVE-2013-2460 |
| and + all or some | CVE-2013-1690 | CVE-2013-2423 | CVE-2013-2471 | CVE-2013-2463 | ||
| exploits | CVE-2013-2465 | CVE-2013-2471 | ||||
| from the previous | ||||||
| version |
| Styx 4.0 | Cool | Topic EK | Nice EK |
|---|---|---|---|
| CVE-2010-0188 | CVE-2012-0755 | CVE-2013-2423 | CVE-2012-1723 |
| CVE-2011-3402 | CVE-2012-1876 | ||
| CVE-2012-1723 | CVE-2013-0634 | ||
| CVE-2013-0422 | CVE-2013-2465 | ||
| CVE-2013-1493 | cve-2013-2471 | ||
| CVE-2013-2423 | and + all or some | ||
| CVE-2013-2460 | exploits | ||
| CVE-2013-2463 | from the previous | ||
| CVE-2013-2472 | version | ||
| CVE-2013-2551 | |||
| Social Eng |
=================================================================
The Explot Pack Table has been updated and you can view it here.
Exploit Pack Table Update 19.1 - View or Download from Google Apps
If you keep track of exploit packs and can/wish to contribute and be able to make changes, please contact me (see email in my profile)
I want to thank L0NGC47, Fibon, and Kafeine, Francois Paget, Eric Romang, and other researchers who sent information for their help.
Update April 28, 2013 - added CVE-2013-2423 (Released April 17, 2013) to several packs.
Now the following packs serve the latest Java exploit (update your Java!)
- Styx
- Sweet Orange
- Neutrino
- Sakura
- Whitehole
- Cool
- Safe Pack
- Crime Boss
- CritX
Other changes
Updated:
- Whitehole
- Redkit
- Nuclear
- Sakura
- Cool Pack
- Blackhole
- Gong Da
- KaiXin
- Sibhost
- Popads
- Alpha Pack
- Safe Pack
- Serenity
- SPL Pack
There are 5 tabs in the bottom of the sheet
- 2011-2013
- References
- 2011 and older
- List of exploit kits
- V. 16 with older credits

March 2013
The Explot Pack Table, which has been just updated, has migrated to Google Apps - the link is below. The new format will allow easier viewing and access for those who volunteered their time to keep it up to date.
In particular, I want to thank
L0NGC47, Fibon, and Kafeine for their help.
There are 5 tabs in the bottom of the sheet
- 2011-2013
- References
- 2011 and older
- List of exploit kits
- V. 16 with older credits
- Neutrino - new
- Cool Pack - update
- Sweet Orange - update
- SofosFO aka Stamp EK - new
- Styx 2.0 - new
- Impact - new
- CritXPack - new
- Gong Da - update
- Redkit - update
- Whitehole - new
- Red Dot - new
The long overdue Exploit pack table Update 17 is finally here. It got a colorful facelift and has newer packs (Dec. 2011-today) on a separate sheet for easier reading.Updates / new entries for the following 13 packs have been added (see exploit listing below)
- Redkit
- Neo Sploit
- Cool Pack
- Black hole 2.0
- Black hole 1.2.5
- Private no name
- Nuclear 2.2 (Update to 2.0 - actual v. # is unknown)
- Nuclear 2.1 (Update to 2.0 - actual v. # is unknown)
- CrimeBoss
- Grandsoft
- Sweet Orange 1.1 Update to 1.0 actual v. # is unknown)
- Sweet Orange 1.0
- Phoenix 3.1.15
- NucSoft
- Sakura 1.1 (Update to 1.0 actual v. # is unknown)
- AssocAID (unconfirmed)
Exploit lists for the added/updated packs
08-'12 |
for Wild Wild West graphic
- CVE-2011-0559 - Flash memory corruption via F-Secure
- CVE-2012-0507 - Java Atomic via Krebs on Security
- CVE-2011-3544 - Java Rhino via Krebs on Security
- CVE-2012-0507 - Java Atomic- after 1.8.91was released
- CVE-2011-3544 - Java Rhino
- CVE-2011-3521 - Java Upd.27 see Timo Hirvonen, Contagio, Kahu Security and Michael 'mihi' Schierl
- CVE-2011-2462 - Adobe PDF U3D
Also includes
"Flash pack" (presumably the same as before)
"Quicktime" - CVE-2010-1818 ?
- CVE-2012-0507 - Java Atomic
- CVE-2012-0507 - Java Atomic
- CVE-2011-3544 - Java Rhino + Java TC (in one file)
- CVE-2011-3544 Oracle Java Rhino
- CVE-2010-0840 JRE Trusted Method Chaining
- CVE-2010-0188 Acrobat Reader – LibTIFF
- CVE-2006-0003 MDAC
- CVE-2011-3544 - Java Rhino (It was in Exploitpack table v15, listing it to show all packs with this exploit)
- CVE-2012-0003 - WMP MIDI
- CVE-2011-1255 - IE Time Element Memory Corruption
- CVE-2011-2140 - Flash 10.3.183.x
- CVE-2011-2110 - Flash 10.3.181.x
- CVE-2010-0806 - IEPeers
- CVE-2011-2140 - Flash 10.3.183.x
- CVE-2012-0003 - WMP MIDI
- CVE-2011-3544 - Java Rhino
- CVE-2010-0886 - Java SMB
- CVE-2010-0840 - JRE Trusted Method Chaining
- CVE-2008-2463 - Snapshot
- CVE-2010-0806 - IEPeers
- CVE-2007-5659/2008-0655 - Collab.collectEmailInfo
- CVE-2008-2992 - util.printf
- CVE-2009-0927 - getIco
- CVE-2009-4324 - newPlayer
Additions - with many thanks to Kahu Security
Hierarchy Exploit Pack
=================
CVE-2006-0003
CVE-2009-0927
CVE-2010-0094
CVE-2010-0188
CVE-2010-0806
CVE-2010-0840
CVE-2010-1297
CVE-2010-1885
CVE-2011-0611
JavaSignedApplet
Siberia Private
==========
CVE-2005-0055
CVE-2006-0003
CVE-2007-5659
CVE-2008-2463
CVE-2008-2992
CVE-2009-0075
CVE-2009-0927
CVE-2009-3867
CVE-2009-4324
CVE-2010-0806
Techno XPack
===========
CVE-2008-2992
CVE-2010-0188
CVE-2010-0842
CVE-2010-1297
CVE-2010-2884
CVE-2010-3552
CVE-2010-3654
JavaSignedApplet
"Yang Pack"
=========
CVE-2010-0806
CVE-2011-2110
CVE-2011-2140
CVE-2011-354
Version 14 Exploit Pack table additions:
Credits for the excellent Wild Wild West (October 2011 edition) go to kahusecurity.com
With many thanks to XyliBox (Xylitol - Steven), Malware Intelligence blog, and xakepy.cc for the information:
If you find any errors or CVE information for packs not featured , please send it to my email (in my profile above, thank you very much) .
- Blackhole 1.2.1 (Java Rhino added, weaker Java exploits removed)
- Blackhole 1.2.1 (Java Skyline added)
- Sakura Exploit Pack 1.0 (new kid on the block, private pack)
- Phoenix 2.8. mini (condensed version of 2.7)
- Fragus Black (weak Spanish twist on the original, black colored admin panel, a few old exploits added)
The full table in xls format - Version 14 can be downloaded from here.
The exploit pack table in XLSX format
The exploit pack table in csv format
P.S. There are always corrections and additions thanks to your feedback after the document release, come back in a day or two to check in case v.15 is out.
Kahusecurity issued an updated version of their Wild Wild West graphic that will help you learn Who is Who in the world of exploit packs. You can view the full version of their post in the link above.
- Bleeding Life 3.0
- Merry Christmas Pack (many thanks to kahusecurity.com)+
- Best Pack (many thanks to kahusecurity.com)
- Sava Pack (many thanks to kahusecurity.com)
- LinuQ
- Eleonore 1.6.5
- Zero Pack
- Salo Pack (incomplete but it is also old)
- Best Pack
- Blackhole Exploit 1.0
- Blackhole Exploit 1.1
- Bleeding Life 2.0
- Bleeding Life 3.0
- Bomba
- CRIMEPACK 2.2.1
- CRIMEPACK 2.2.8
- CRIMEPACK 3.0
- CRIMEPACK 3.1.3
- Dloader
- EL Fiiesta
- Eleonore 1.3.2
- Eleonore 1.4.1
- Eleonore 1.4.4 Moded
- Eleonore 1.6.3a
- Eleonore 1.6.4
- Eleonore 1.6.5
- Fragus 1
- Icepack
- Impassioned Framework 1.0
- Incognito
- iPack
- JustExploit
- Katrin
- Merry Christmas Pack
- Liberty 1.0.7
- Liberty 2.1.0*
- LinuQ pack
- Lupit
- Mpack
- Mushroom/unknown
- Open Source Exploit (Metapack)
- Papka
- Phoenix 2.0
- Phoenix 2.1
- Phoenix 2.2
- Phoenix 2.3
- Phoenix 2.4
- Phoenix 2.5
- Phoenix 2.7
- Robopak
- Salo pack
- Sava Pack
- SEO Sploit pack
- Siberia
- T-Iframer
- Unique Pack Sploit 2.1
- Webattack
- Yes Exploit 3.0RC
- Zero Pack
- Zombie Infection kit
- Zopack
----------------------------------------------
Bleeding Life 3.0
New Version Ad is here
Merry Christmas Pack read analysis atkahusecurity.com | Best Pack kahusecurity.comread analysis at | Sava Pack read analysis at kahusecurity.com |
Eleonore 1.6.5 [+] CVE-2011-0611 [+] CVE-2011-0559 [+] CVE-2010-4452 [-] CVE-2010-0886 | Salo Pack Old (2009), added just for the collection | Zero Pack 62 exploits from various packs (mostly Open Source pack) |
LinuQ pack Designed to compromise linux servers using vulnerable PHPMyAdmin. Comes with DDoS bot but any kind of code can be loaded for Linux botnet creation.LinuQ pack is PhpMyAdmin exploit pack with 4 PMA exploits based on a previous Russian version of the Romanian PMA scanner ZmEu. it is not considered to be original, unique, new, or anything special. All exploits are public and known well. It is designed to be installed on an IRC server (like UnrealIRCD). IP ranges already listed in bios.txt can be scanned, vulnerable IPs and specific PMA vulnerabilities will be listed in vuln.txt, then the corresponding exploits can be launched against the vulnerable server. It is more like a bot using PMA vulnerabilities than exploit pack. It is using CVE-2009-1148 (unconfirmed) CVE-2009-1149 (unconfirmed) CVE-2009-1150 (unconfirmed) CVE-2009-1151 (confirmed) | ||
====================================================================
See the list of packs covered in the list below
The full table in xls format - Version 12 can be downloaded from here.
Version 11 May 26, 2011 Changes:
- Phoenix2.7
- "Dloader" (well, dloader is a loader but the pack is some unnamed pack http://damagelab.org/lofiversion/index.php?t=20852)
- nuclear pack
- Katrin
- Robopak
- Blackhole exploit kit 1.1.0
- Mushroom/unknown
- Open Source Exploit kit
====================================================================
10. May 8, 2011 Version 10 Exploit Pack Table_V10May11
First, I want to thank everyone who sent and posted comments for updates and corrections.
*** The Wild Wild West picture is from a great post about evolution of exploit packs by Kahu Security Wild Wild West Update
As usual, send your corrections and update lists.
Go1Pack (not included) as reported as being a fake pack, here is a gui. Here is a threatpost article referencing it as it was used for an attack
- Eleonore 1.6.4
- Eleonore 1.6.3a
- Incognito
- Blackhole
Also, here is another article claiming it is not a fake http://community.websense.com/blogs/securitylabs/archive/2011/04/19/Mass-Injections-Leading-to-g01pack-Exploit-Kit.aspx
Go1 Pack CVE are reportedly
CVE-2006-0003
CVE-2009-0927
CVE-2010-1423
CVE-2010-1885
Does anyone have this pack or see it offered for sale?
Exploit kits I am planning to analyze and add (and/or find CVE listing for) are:
- Open Source Exploit Kit
- SALO
- K0de
Also, here is a great presentation by Ratsoul (Donato Ferrante) about Java Exploits (http://www.inreverse.net/?p=1687)
--------------------------------------------------------
9. April 5, 2011 Version 9 ExploitPackTable_V9Apr11
It actually needs another update but I am posting it now and will issue version 10 as soon as I can.
Changes:
Phoenix 2.5
IFramer
Tornado
Bleeding life
Many thanks to Gunther for his contributions.
If you wish to add some, please send your info together with the reference links. Also please feel free to send corrections if you notice any mistakes
- Eleonore 1.4.4 Moded added (thanks to malwareint.blogspot.com)
- Correction on CVE-2010-0746 in Phoenix 2.2 and 2.3. It is a mistake and the correct CVE is CVE-2010-0886 (thanks to ♫etonshell for noticing)
- SEO Sploit pack added (thanks to whsbehind.blogspot.com, evilcodecave.blogspot.com and blog.ahnlab.com)














