- Website : http://netifera.com/research/
- Discussion Forum :
- Mailing List :
- Platforms : Windows, Linux, Mac OSX
- License : GNU GPL
- Author :
- Contact Email : info@netifera.com























It notes: is asked the please contribute suggestions and to report the bugs that be found.
For the correct use of the application is needed to register the ocx. Carry out to register the ocx that come inside the folder OCX.
Any doubt on this to notify.
In it personnel bearing a grudge to create in its disk a called folder OCX and there to move the content and to execute the register.exe and clickear the boton of Register.

[+] To be Reviewed Connection
[+] Webcam Shot
[+] You Give you& swindle Manger
[+] printer
[+] Control pannel
[+] Pc control
[+] Exucutor
[+] Two command
[+] Windows manager
[+] Screen Shot
[+] Remote server manager
[+] Server to remove
[+] Ip Graber
[+] Server Downloader
[+] Icon Changer
[+] Audio Streaming
[+] Encrypt Settings
[+] Volume Control
[+] Connection Logs
[+] Instaled Appliction
[+] Infect All USB
[+] P2P Spreading
[+] Msn Spreading
[+] Multilanguage
[+] Services Viewer
[+] Remote passwords
[+] MSN Controler
[+] Remote Shell
[+] Chat with server
[+] Send fake messages
[+] files manager
[+] Find files
[+] Change remote screen resolution
[+] Information about remote computer
[+] Clipboard manager
[+] IE options
[+] Running Process
[+] Troyanosyvirus. com. ar
[+] Online keylogger
[+] Offline keylogger
[+] Fun Menu
[+] Remote Nat viewer
[+] Rmote Resotr Manager
[+] Added Some Graphics
[+] Some minor Bugs fixed
[+] Some Forms there you Are Been Modified
[+] News Navigator was Added
[+] Invisible in Searching Files
[+] Server Size (120kb)

1. Things basicas of a good one Malware
2. Complicating the desinfeccion of the Worm
3. Propagacion by networks P2P
4. Propagacion by MSN
5. Encriptacion Anti-Huristica of the AV' s
6. You sign in the PC
7. Propagacion by e-mail (this even I have to learn it)
8. Infeccion of files. exe and files. rar
9. Sorpresitas in the code of the Worm



SYN Flood Two is a program created by defc0n1 to do Denials of service by means of flood of packages SYN. These packages SYN are petitions of connection, and they have IPs of false origin for which the connection never is carried out and remains to the wait. When thousands of petitions have been sent the servant remains paralyzed and he does not accept new connections.
Caracteristicas
- He Is a lot but effective when attacks since various points are done (DDoS)
- Upon having thousands of alone and false from IPs connection intents to have several true (those of the assailants) is very complicated that the IDS or the Administrator of the system can locate the real assailants.
- This it based on Nmap with the use of Decoys
- It Sends 115 SYN by each Scaneo, that is to say, approximately each second middle depending on the power of the computer and of the network.
Way of use
1- It Opens the program, and wait to that this loaded one of the all (delays a little because contains Nmap complete, and has to decompress and to charge all the files)
2- If it is the first time that you open it and do not have WinPcap installed will leave you the following notice:
((WARNING! It seems that you have not installed WinPcap. Its neccesary to run the Two, gave you want to install it now? And/N:))
We put AND, we give to enter and we install it
If you have it already installed give him to N and continuous
3- it says You that introduce the Target (objective), therefore put the IP (for example 192.168.1.1) or the DNS (http://www.sgae.es/) that want to attack.
4- you have to put the port to attack. If it is a Web is the Http (80), but if you want to attack another service as FTP (21) or Telnet (23) tendras that to put its port. Evidently, the port has to be open and to it listens.
5- When it put "DoSing the target; -)" and down the escaneos leave of Nmap constantly, already these attacking to it kills
Text written by the author defc0n1
The program should be used alone to test their own servants or networks, these attacks can be avoided.
Bearing a grudge to seek informacion on this type of two, they can see in wikipedia the operation basico: in Spanish or in English but but I specify.
It unloads
SYN Flood Two (rapidshare)
SYN Flood Two (megaupload)
pass: troyanosyvirus. com. ar
TriCk! Browser v1 |
i am currently learning c++ and VB.NET, so i thought il start of by making a hackers based browser, i got a better version but im still in the proccess of adding other stuff and making it look better etc.
TriCk Browser v1:
- Built in google search
- Built in milw0rm search (to search for vuln web-apps/programs and the latest exploits etc)
- Built in who.is
- Built in Reverse ip
Standard browser Buttons: GO!, Back, Forward, Home, Stop
Right Click Functions: same as internet explorer
known bugs:
- some sites load slow (fixed in next version)
- when clicking some links they open in firefox or ie (fixed in next version)
Screenshot:
Download: http://www.speedyshare.com/817265447.html
CREATED BY TRICK AKA SAYWHAT? - NIPZ.ORG
This version is a bit more secure so fare no bugs.
May send slower but dont worry ^^
_____________
Features:
Can use any mailing system to send through (out going)
A bit less harsh on ur CPU ^^
Allowd to save settigns *so you dont gotta type same things in* (if doesnt work then tell me i will TRY to fix :) )
PM me if you want a gmail account to use *not giving others just 1's ive pre-made*
_____________
What may come:
I will try to make it were i can make some updates to the program from my pc so you can be updated :)
Mass mailer (sends to muli-victims)
threading (better)
Screen shot
Downlaod
http://www.mediafire.com/?cn5znqykxyd
By:Security warning team(www.hackeroo.com)Development
Function on :
NetBot_Attacker Is a comprehensive pressure as well as the DDOS test attack
He may control the most PC computer to start DDOS to attack!
The main attack type has:
Ordinary attack: SYN Flood,ICMP Flood,UDP Flood,UDP small,TCP Flood,TCP multi-link
WEB Attack:HTTP No-Cache Get Flood,CC Variety attack,HTTPGET
Special attack: GAME attack,CIDR attack,Hybrid attack
Auxiliary function::
Download operation,Shutdown unloading,Open URL,All shutdown
Help:You only need to have the FTP space and may use it,
Or you are fixed IP,Or your free application dynamic domain name.
The thanks supports NetBot_Attacker,We also opened the VIP edition.
VIP service of edition end little, EXE WROM, U records of spread, Intranet travel, attack might to be further loud .
download
Code:
http://rapidshare.com/files/22099705/Ne ... h.rar.html
http://www5.hackeroo.com/NetBot_Attacker 1.4 English.rar
::DowNLOaD::
http://www.nirsoft.net/utils/mailpv.zip
::HomePage::
By
electroman
Mr_electroman
el3ctr0M4N
We Are One
Features
* All versions of RAR are supported including 3.x Updated!
* Brute-Force, Xieveâ„¢ or Dictionary attacks are used to recover the password
* Additional user dictionaries support, case changes, multiple mistypes and other modifications for each dictionary word
* Program automatically saves password search state and can resume after a stop or a crash
* Patterns can be used to minimize search time if any part of the password is known
* Non-English characters in passwords are supported
* Full install/uninstall support
RAR Key recovers passwords for RAR archives.
http://www.lostpassword.com/demos/rarkeyd.exe
Mr electroman
If you want to stop hackers from invading your network, first you’ve got to invade their minds.
The CEH Program certifies individuals in the specific network security discipline of Ethical hacking from a vendor-neutral perspective. The Certified Ethical hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
Download Links
http://rapidshare.com/files/27445021/Certified_Ethical_Hacker_Lab_3.0.part01.rar
http://rapidshare.com/files/27445043/Certified_Ethical_Hacker_Lab_3.0.part02.rar
http://rapidshare.com/files/27448148/Certified_Ethical_Hacker_Lab_3.0.part03.rar
http://rapidshare.com/files/27448136/Certified_Ethical_Hacker_Lab_3.0.part04.rar
http://rapidshare.com/files/27452154/Certified_Ethical_Hacker_Lab_3.0.part05.rar
http://rapidshare.com/files/27452159/Certified_Ethical_Hacker_Lab_3.0.part06.rar
http://rapidshare.com/files/27455943/Certified_Ethical_Hacker_Lab_3.0.part07.rar
http://rapidshare.com/files/27455952/Certified_Ethical_Hacker_Lab_3.0.part08.rar
http://rapidshare.com/files/27459009/Certified_Ethical_Hacker_Lab_3.0.part09.rar
http://rapidshare.com/files/27458158/Certified_Ethical_Hacker_Lab_3.0.part10.rar
Mr electroman 2009
https://siteexplorer.search.yahoo.com/submit
http://search.msn.com/docs/submit.aspx























It notes: is asked the please contribute suggestions and to report the bugs that be found.
For the correct use of the application is needed to register the ocx. Carry out to register the ocx that come inside the folder OCX.
Any doubt on this to notify.
In it personnel bearing a grudge to create in its disk a called folder OCX and there to move the content and to execute the register.exe and clickear the boton of Register.

[+] To be Reviewed Connection
[+] Webcam Shot
[+] You Give you& swindle Manger
[+] printer
[+] Control pannel
[+] Pc control
[+] Exucutor
[+] Two command
[+] Windows manager
[+] Screen Shot
[+] Remote server manager
[+] Server to remove
[+] Ip Graber
[+] Server Downloader
[+] Icon Changer
[+] Audio Streaming
[+] Encrypt Settings
[+] Volume Control
[+] Connection Logs
[+] Instaled Appliction
[+] Infect All USB
[+] P2P Spreading
[+] Msn Spreading
[+] Multilanguage
[+] Services Viewer
[+] Remote passwords
[+] MSN Controler
[+] Remote Shell
[+] Chat with server
[+] Send fake messages
[+] files manager
[+] Find files
[+] Change remote screen resolution
[+] Information about remote computer
[+] Clipboard manager
[+] IE options
[+] Running Process
[+] Troyanosyvirus. com. ar
[+] Online keylogger
[+] Offline keylogger
[+] Fun Menu
[+] Remote Nat viewer
[+] Rmote Resotr Manager
[+] Added Some Graphics
[+] Some minor Bugs fixed
[+] Some Forms there you Are Been Modified
[+] News Navigator was Added
[+] Invisible in Searching Files
[+] Server Size (120kb)

1. Things basicas of a good one Malware
2. Complicating the desinfeccion of the Worm
3. Propagacion by networks P2P
4. Propagacion by MSN
5. Encriptacion Anti-Huristica of the AV' s
6. You sign in the PC
7. Propagacion by e-mail (this even I have to learn it)
8. Infeccion of files. exe and files. rar
9. Sorpresitas in the code of the Worm



SYN Flood Two is a program created by defc0n1 to do Denials of service by means of flood of packages SYN. These packages SYN are petitions of connection, and they have IPs of false origin for which the connection never is carried out and remains to the wait. When thousands of petitions have been sent the servant remains paralyzed and he does not accept new connections.
Caracteristicas
- He Is a lot but effective when attacks since various points are done (DDoS)
- Upon having thousands of alone and false from IPs connection intents to have several true (those of the assailants) is very complicated that the IDS or the Administrator of the system can locate the real assailants.
- This it based on Nmap with the use of Decoys
- It Sends 115 SYN by each Scaneo, that is to say, approximately each second middle depending on the power of the computer and of the network.
Way of use
1- It Opens the program, and wait to that this loaded one of the all (delays a little because contains Nmap complete, and has to decompress and to charge all the files)
2- If it is the first time that you open it and do not have WinPcap installed will leave you the following notice:
((WARNING! It seems that you have not installed WinPcap. Its neccesary to run the Two, gave you want to install it now? And/N:))
We put AND, we give to enter and we install it
If you have it already installed give him to N and continuous
3- it says You that introduce the Target (objective), therefore put the IP (for example 192.168.1.1) or the DNS (http://www.sgae.es/) that want to attack.
4- you have to put the port to attack. If it is a Web is the Http (80), but if you want to attack another service as FTP (21) or Telnet (23) tendras that to put its port. Evidently, the port has to be open and to it listens.
5- When it put "DoSing the target; -)" and down the escaneos leave of Nmap constantly, already these attacking to it kills
Text written by the author defc0n1
The program should be used alone to test their own servants or networks, these attacks can be avoided.
Bearing a grudge to seek informacion on this type of two, they can see in wikipedia the operation basico: in Spanish or in English but but I specify.
It unloads
SYN Flood Two (rapidshare)
SYN Flood Two (megaupload)
pass: troyanosyvirus. com. ar
TriCk! Browser v1 |
i am currently learning c++ and VB.NET, so i thought il start of by making a hackers based browser, i got a better version but im still in the proccess of adding other stuff and making it look better etc.
TriCk Browser v1:
- Built in google search
- Built in milw0rm search (to search for vuln web-apps/programs and the latest exploits etc)
- Built in who.is
- Built in Reverse ip
Standard browser Buttons: GO!, Back, Forward, Home, Stop
Right Click Functions: same as internet explorer
known bugs:
- some sites load slow (fixed in next version)
- when clicking some links they open in firefox or ie (fixed in next version)
Screenshot:
Download: http://www.speedyshare.com/817265447.html
CREATED BY TRICK AKA SAYWHAT? - NIPZ.ORG
This version is a bit more secure so fare no bugs.
May send slower but dont worry ^^
_____________
Features:
Can use any mailing system to send through (out going)
A bit less harsh on ur CPU ^^
Allowd to save settigns *so you dont gotta type same things in* (if doesnt work then tell me i will TRY to fix :) )
PM me if you want a gmail account to use *not giving others just 1's ive pre-made*
_____________
What may come:
I will try to make it were i can make some updates to the program from my pc so you can be updated :)
Mass mailer (sends to muli-victims)
threading (better)
Screen shot
Downlaod
http://www.mediafire.com/?cn5znqykxyd
By:Security warning team(www.hackeroo.com)Development
Function on :
NetBot_Attacker Is a comprehensive pressure as well as the DDOS test attack
He may control the most PC computer to start DDOS to attack!
The main attack type has:
Ordinary attack: SYN Flood,ICMP Flood,UDP Flood,UDP small,TCP Flood,TCP multi-link
WEB Attack:HTTP No-Cache Get Flood,CC Variety attack,HTTPGET
Special attack: GAME attack,CIDR attack,Hybrid attack
Auxiliary function::
Download operation,Shutdown unloading,Open URL,All shutdown
Help:You only need to have the FTP space and may use it,
Or you are fixed IP,Or your free application dynamic domain name.
The thanks supports NetBot_Attacker,We also opened the VIP edition.
VIP service of edition end little, EXE WROM, U records of spread, Intranet travel, attack might to be further loud .
download
Code:
http://rapidshare.com/files/22099705/Ne ... h.rar.html
http://www5.hackeroo.com/NetBot_Attacker 1.4 English.rar
::DowNLOaD::
http://www.nirsoft.net/utils/mailpv.zip
::HomePage::
By
electroman
Mr_electroman
el3ctr0M4N
We Are One
Features
* All versions of RAR are supported including 3.x Updated!
* Brute-Force, Xieveâ„¢ or Dictionary attacks are used to recover the password
* Additional user dictionaries support, case changes, multiple mistypes and other modifications for each dictionary word
* Program automatically saves password search state and can resume after a stop or a crash
* Patterns can be used to minimize search time if any part of the password is known
* Non-English characters in passwords are supported
* Full install/uninstall support
RAR Key recovers passwords for RAR archives.
http://www.lostpassword.com/demos/rarkeyd.exe
Mr electroman
If you want to stop hackers from invading your network, first you’ve got to invade their minds.
The CEH Program certifies individuals in the specific network security discipline of Ethical hacking from a vendor-neutral perspective. The Certified Ethical hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
Download Links
http://rapidshare.com/files/27445021/Certified_Ethical_Hacker_Lab_3.0.part01.rar
http://rapidshare.com/files/27445043/Certified_Ethical_Hacker_Lab_3.0.part02.rar
http://rapidshare.com/files/27448148/Certified_Ethical_Hacker_Lab_3.0.part03.rar
http://rapidshare.com/files/27448136/Certified_Ethical_Hacker_Lab_3.0.part04.rar
http://rapidshare.com/files/27452154/Certified_Ethical_Hacker_Lab_3.0.part05.rar
http://rapidshare.com/files/27452159/Certified_Ethical_Hacker_Lab_3.0.part06.rar
http://rapidshare.com/files/27455943/Certified_Ethical_Hacker_Lab_3.0.part07.rar
http://rapidshare.com/files/27455952/Certified_Ethical_Hacker_Lab_3.0.part08.rar
http://rapidshare.com/files/27459009/Certified_Ethical_Hacker_Lab_3.0.part09.rar
http://rapidshare.com/files/27458158/Certified_Ethical_Hacker_Lab_3.0.part10.rar
Mr electroman 2009
https://siteexplorer.search.yahoo.com/submit
http://search.msn.com/docs/submit.aspx