~ The Tools Sections ~
|
Main tools at searchlores,
Version 5.12: May 2005
|
| |
|
 |
|
SrTools | Go to the softwareversing tools |
|
Introduction to the web searching tools |
This "internet searching tools"
page loads more than 70.000 bytes, but as you'll soon realize they are worth loading in
gold. My tools page is not only a "swiss blades" repository for newbies that
begin to grasp our powerful reversers' and seekers' lore... the tools I have
gathered on this page should be useful as well for any powerful one that happens to be "lost on an
alien computer"... miles from home, and without his trusted own-made CDs.
This
happens to me often enough, hence I found myself this page quite
useful more than once :-)
You'll find here (I hope) all the necessary tools to
survive, secure your current box, AND reverse everything in sight, and then some.
There are
tools here, that will even allow you to retaliate and strike back, should anyone dare to
annoy you!
This section will always be "in fieri", yet there's no other section
of my site that you should peruse as thoroughly as this one...
Note
that there are NO CRACKED applications whatsoever here (nor anywhere else
on my sites). All software is in pristine, original, uncracked conditions.
I wonder why should anyone publish or distribute cracked programs: their
protections - as far as they are protected at all
- are so stupid that anyone with eggplant intelligence could crack them "on the
fly" in three seconds flat... as I show here for some pitiful cases.
Moreover: the complete and regged full versions of
any software program are so easy to
find on the web that it is a shame.
Another intent of mine, on this page, is to demonstrate that you
DO NOT need the most recent version of a given software... far from it: you may
in most cases use a old dos program instead of the most recent
frilly windoze "xp" application, with the advantage (if you use such "older" applications) that
you'll at least be sure that the program you use are not trojaning your data somewhere
in the background everytime you connect to the web!
|
Main advice of this "Tools"
section |
DO NOT UPDATE YOUR
SOFTWARE IF YOU CAN AVOID IT!...
...unless you know pretty well how to reverse - and modify -
it!
As a (simplistic) rule: the older your version, the less likely it is
that it will [malbehave] and spy on you...
You want a typical example? WINAMP, the mp3 player.
You should use previous versions, for instance version 2.91 (see below)
All more recent versions, from version 3 onward, hog
your resources a lot and are spyware (I.e.: send your data back to mama).
|
"Non software" tools
pointers |
[Archies
& FTP]: Tools for seekers.
[Iefaf's
ITool-Box]: Proxying, Stalking, Connecting,
Securing
[Translation services and other Linguistic aids]: Translation services, very useful for seekers.
The lore of tools (and the simplcity of tools
registering) |
How to find any tool: first of all you better know the [exact
name] of your target, or, even better, of the
zipped file of your target (knowing names is quite an advantage, eh). Do not
limit yourself to zip and try a search for *.rar files as well. Do not forget
*.lha, *.arj and *.ace files either, duh.
Lacking the exact name, try to guess
it :-) If you don't manage to guess it, try to find it
nevertheless applying some synecdochical searching
tactiques :-) Should you still have problems finding your target, and
should you have (probably wrongly) concluded that it does not seem to be
anywhere on Internet, check if it did maybe exist BEFORE on the web.
Once you have found (or inferred, or guessed) the name of your target,
either you use a [archie & ftp-search] or you search google/fast/teoma/alta with something like +target_name +download nfo of course you could also search for
+target_name +crack* +serial* nfo nor +target_name (+warez OR +appz) nfo. Alternatively you can use
some underground, usenet and irc-related search
techniques, but be warned that some of this could be deemed "illegal" in some cast-away copyright-bigot
places.
Anyway, when seeking on such paths, you may enjoy the knowledge you'll gather on our Webbits & Rabbits section...
But normally things are incredibly easy (and that's mostly because
the programmers do not know how to protect their software):
let's, for instance, imagine that you are interested in a specific application,
let's say teleport
pro version 1.28. In that case you could simply search for +"teleport
pro 1.28" +serial -"click on" -tits in order to quickly find a ready made
serial number (avoiding most commercial and porn sites) and register your copy.
This is less fun - and waay less instructive- than cracking your appz yourself,
but gets the mustard cut nevertheless if you are in a hurry... the dark side of
the evil power of knowing how to search, I guess.
Yet, before you ask: YES, your
ISP, your "free" search engine and your friendly neighbours all do actively
monitor your searches... that's the reason you should 1) use some of the tools you'll find in this page... opera,
proxomitron,
a good firewall, ipticker... and, by all means, learn some [anonymity
lore] basic as soon as you find some time...
As usual: any comment, addition, suggestion or correction to this page is
welcome
Searching inside your own harddisks
and
Fetching entire sites
Forgetting where the hell did you
put that file...
admittedly embarassing for 'real' searchers :-)
File finders
FF.zip ~ 5715 bytes
Use this old, useful program. NEVER use
the "start/search" function in windows xp, which silently connects
on port 80 to sa.windows.com (207.46.248.249)
in order to deliver to the ugly microsoft's minions your IP and what you are searching for on
your own harddisk. Start/search - in Windows XP - is MALWARE eo ipso.
agentran.zip ~ 787735 bytes ~ Agent Ransack, by David Vest, is the freeware version of File Locator Pro
Agent Ransack is a tool for finding files and information on your hard drive fast and efficiently.
When searching the contents of files Agent Ransack also displays the text found.
Users can then quickly browse the results without having to separately open each file.
The regular expression 'search' would match any string containing 'search'.
So if you wanted to find a file with the letters 'teoma' in it the regular expression would simply be 'teoma'.
To find a file that begins with 'Dear' or 'Yesterday' followed at some point by 'Document' or 'Documents'
followed at some point by a number and has a '.txt'
extension the expression would be: '^(Dear|Yesterday).*Documents?.*[0-9]+.*\.txt$'
You can test your regular expressions, before searching, through an ad hoc Test->Regular expression menu option
Use this useful program.
NEVER use
the "start/search" function in windows xp, which silently connects
on port 80 to sa.windows.com (207.46.248.249)
in order to deliver to the ugly microsoft's minions your IP and what you are searching for on
your own harddisk. Start/search - in Windows XP - is MALWARE eo ipso.
File Greppers
See also Agent Ransack above, which is a good grepper.
grep.zip ~ 4624 bytes
grep.zip ~ 7023 bytes grep.com
[Turbogrep version 3 by Borland,
1992]
Most useful tool, must have on your harddisk
grep20dw.zip ~
202064 bytes grep20dw.zip
[grep for Windows 95/98/NT, version 20d by Tim Charron
1998]
Most useful tool, must have on your harddisk comes WITH SOURCE code
(Gnu)
grep32.zip ~ 610381
bytes grep32.zip
[Windows grep 2.2. 95/98/2000/NT, by Huw Millington
2000]
Code is a tag overbloated and slow, but, hey, it does not choke on windoze's
temp and swap files! Works quite well inside executables (be
warned, though, it fail eventual matches on the 256 boundaries)
Site Greppers
Teleport
Pro
teleport128.zip ~
1670460 bytes ~ Teleport Pro, version 1.28, 1997
See the following essays (regarding the bad habits of version 1.29):
Teleport Pro 1.29, malware
galore by Faulpelz, May 2000
Delving deeper into Teleport Pro
1.29 by Noos, October 2000
Teleport Pro V1.29 (Build
1107) by Faulpelz, January 2001
Stringers
strings.zip ~ 9272
bytes strings.zip ~ 17413 bytes strings.exe
[strings ver 1 by
myself :-]
Most useful tool, find printable strings in any binary
file, must have on your harddisk
bintscan.zip ~
84730 bytes bintscan.zip
[binary text scan!]
Most useful tool, find
strings without leaving windoze
Searching elsewhere
Most useful tools
when you happen to find, somewhere on the web, say an oreilly books "depot" :-)
All-purpose Fetchers
wget1531.zip ~
106681 bytes strings.zip
[wget ver 1.5.3.1 GNU license]
Most useful
fetcher (non interactive network retriever), must have for speedy
mass-downloads
"Nothing, NOTHING, beats wget. Nothing." (A+heist, explaining in his Leipziger workshop some web-tools)
Searching the web with ready-made
bots
Ok, this is admittedly embarassing for 'real'
searchers
(coz you should write
your bots yourself instead of using commercial crap, that moreover is often
enough "advertisement infested"... well, at least we can easily "take care" of
this last annoying habit :-)
the "ferrets"
ferre302.zip ~ 503833
bytes ferre302.zip ~ 1134088 bytes webfer~1.exe
web ferret,
version 3.02, queries popular search engines, astounding useful results at
times. Disabling its awful "advertfeature" it's a real & easy
pleasure. See for instance how you can "clean" on the fly this bot on my Milan workshop papers,
or a more deeper analysis in this essay.
copernic.zip ~
2716185 bytes copernic.zip ~ Copernic 2000, french version.
Good bot, even if heavily commercial oriented and advertisement
banners infested (see +Tsehp's essays in my anti advertisement section).
+Tsehp demonstrated the utter banality of the advertisement removal
procedure for Copernic 2000/4.5... this gives us the possibility to
effectuate a simple - and eyes' soothing - "single byte shoot":
CopernicSvr.exe
:54BB5B E814E9F8FF call 4DA474
:54BB60 E88730F2FF call 46EBEC ;are we allowed to showe ads into your eyes?
:54BB65 84C0 test al, al ;ax is not zero? Ahah! Eat ads, poor luser!
:54BB67 0F8599000000 jne 54BC06 ;0F84... (je 54BC06 would sooth your eyeballs ;-)
:54BB6D A1B8785700 mov eax, dword ptr [5778B8]
:54BB72 80780C00 cmp byte ptr [eax+0C], 00
But we have [our own bots] as well...
Check also [mysearch.zip]: ~ 20233 bytes A search bot in Visual Basic by
Shoki (see [shokiwcd.htm])
Browsers
Either you know why you should
use these tools, or you search & learn, or just try and understand
:-)
"Probieren geht über studieren"
|
|
[Opera]
~ the ultimate browser for searchers. An incredible tool: your sword on the web!
Also check the ad hoc Tutti all'opera page!
|
Older versions
[version 3.0] [version 3.2] [version 3.6] [version 5.1] [version 6.5]
Version you should use
[version 7.23]
Usually the most recent version is NOT the best one to use. But this case is an exception
As you can read in depth on the ad hoc page, one of the most important things
is that Opera has a very convenient no-images icon
that allows you to stop on the fly all images loading
from any site you are visiting. Not a minor feat in a Web that, as you will
already have realized, is an Ocean of knowledge... about two centimeters deep.
Most sites just overload visitors with completely useless graphical frills:
having a browser able to stop them "on the fly" is a very useful weapon
that you will need again and again. Note also how the development of both the
M$IE and the Netscape browsersaurii went to great lengths to AVOID you having
the possibility to turn off images (and hence advertisements).
But there's
more: Opera has even various 'anti-popup' function BUILT
INSIDE IT: have a look at file ~ preferences ~ windows... see the checkbox for
'allow documents to create windows? Well... uncheck it! What are you waiting
for? :-)
You think I have finished with the advantages that Opera
offers? Nossir...try this other one: file ~ preferences ~ multimedia... see the
checkbox 'enable animation GIF images'? Well... uncheck it! Yep, believe or not:
you can selectively kill those
useless animated gifs that nobody in his right mind would ever 'prefer'
to load! :-)
Of course you can download hic et nunc Opera
for LINUX Opera for LINUX as well...
Did I mention that Opera's
code is 30 times smaller than M$IE or Netscrape?
Opera version 3.0: [opera30.zip] : 1164852 bytes, the ultimate browser for real searchers,
point à la ligne.
This demoversion (30 days protection) is complete and of
course not cracked.
(Not that it would
be difficult to find a valid serial, duh).
Opera version 3.2: [opera32.zip] : 1166787 bytes, the ultimate browser for real searchers,
point à la ligne.
This demoversion (30 days protection) is complete and of
course not cracked.
Opera version 3.6: [opera36.zip] : 1330017 bytes, the ultimate browser for real searchers,
point à la ligne.
This demoversion (30 days protection) has an "improved"
protection scheme which is unfortunately still way too easy to crack, see my
[Tutti
all'opera!] page (I believe that the programmers at
Opera should learn [some better tricks] to protect their valuable software).
Opera version 5.1: [opera510.exe] : 2288192 bytes zipped selfexecutable, the ultimate
browser for real searchers, point à la ligne.
This freeversion has a
crappish advertisement banner that will disappear when you register. See
also my [paris slide] on removing banners from Opera 5.0 trough the
'Procustian' approach.
Opera version 6.5: [ow32enen605.exe] : 3588280 bytes zipped selfexecutable (build 1140), the ultimate
browser for real searchers, point à la ligne.
This freeversion has a
crappish advertisement banner that will disappear when you register. See
my tutti all'opera page for more info.
Ta-daaa!
Opera version 7.23: [ow32en-GBen-GB723.exe] : 3525491 bytes zipped (less than the previous versions!) selfexecutable, the ultimate
browser for real searchers, point à la ligne. This freeversion has a
crappish advertisement banner that will disappear when you register or find a serial on the web. See
my tutti all'opera page for more info. |
VERY Precious Item
|
By all means, use Opera together with
Proxomitron: cosmic power for your seeking trips!
|
Lynx
Lynx: [lynxy.zip] : 683992 bytes, ported from unix, works in a dos box,
very quick, try the non graphical way of quick browsing.
Lynx has some SERIOUS security problems (less than M$IE, anyway) - as
you will learn searching the web - but remains VERY quick, so consider the trade
off risk/speed
Pictureagent [pa27.zip] : 2716159 bytes, version 2.7
Fundamental tool for usenet
image retrieval, 'protected' with one of the stupidest protection you can find
around: the program carries a long hardcoded list of invalid names
(probably people that did spread their registration codes on usenet) and cracker
names like "hans die wurst", "donald ibarra", "escom/core", "iceman [ucf]" and
so on, followed by this silly codesnippet::41596D 8B442430 mov eax, dword ptr [esp+30]
:415971 3BF8 cmp edi, eax
:415973 757A jne 4159EF ;bad_guy_exit
:415975 85FF test edi, edi
:415977 7476 je 4159EF ;bad_guy_exit
:415979 83F801 cmp eax, 1
:41597C 7C71 jl 4159EF ;bad_guy_exit
:41597E 8D4C2410 lea ecx, dword ptr [esp+10]
:415982 C644242400 mov [esp+24], 0
and, ahem, you actually might
want to 'nop' the 4159ef 'bad guy' locations :-)
When will programmers
learn [some better tricks] to protect their software?
VLC is a cross-plaform multimedia player which can be used to read the stream from the network or display video read locally on the computer
under all operating systems. Here the windows version 0.7.0.: [VideoLAN070.zip] 5.116.711 bytes
The VideoLAN french project targets multimedia streaming of MPEG-1, MPEG-2, MPEG-4 and DivX files, DVDs, digital satellite channels, digital
terrestial television channels and live videos on a high-bandwidth IPv4 or IPv6 network in unicast or multicast under many OSes.
VideoLAN is free
software, and is released under the GNU General Public
License.
| Images de-watermarking
tools |
JPG
JPG Cleaner v2.6 [jpgcln26.zip] : 291108 bytes, version 2.6
JPG Cleaner is a Fundamental tool for
image cleaning purposes, by Rainbow Software Programs: JPG Cleaner is a simple
but powerful utility for cleaning JPG files from anything that is not picture data. Commonly used programs
such as Adobe Photoshop write tons of additional information into JPG files, crap that isn't needed at all in
oredr to display correctly the picture.
Texts such as "File written by Adobe Photoshop, Creator: PolyView® Version 3.32 by Polybytes, LEAD Technologies Inc. V1.01
and all sort of preposterous crap will be eo ipso eliminated. Good riddance!
Also gets rid od picture previews (sometimes even bigger than main JPG data!)
And of all that useless color Management data
These data may (may!) be useul only when opening those files inside the program that created them.
Yet any other programs, such as any Internet Browser just skip such data, hence all this uselss crap is downloaded and then
again thrown away!
Always use this program when publishing JPG
files on the Internet: your JPG files will be smaller
(should they contain non-picture data) with NO QUALITY LOSS whasoever.
GIF
Gif Cleaner v2.6d [gc26inst.rar] : 400592 bytes, version 1.1
The FILE menu includes:
Remove Comments
Remove Extraneous Data
Show Embedded Comments
Output Comments to File and Set Display Time
The Remove Comments
Remove Extraneous Data
Show Embedded Comments
Show Images items are toggle menu items
*** Important Note ***
GifClean32 will NOT modify any graphics in the GIF file.
This means if you can see it, then it will be untouched. Comments are not
displayed when viewing gif files via your browser or gif viewing utility.
They are there for "record keeping purposes" or to identify the author, vendor, etc.
Winamp full, version 2.91 [winamp291_full_noaod.zip] : 2293474 bytes
Winamp version 2.91 "No AOL on desktop" Fundamental tool, here in its full zenith,
pre its version 3 nadir. All subsequent versions are resources hoggers and/or overbloated crap and/or send your private data back to mama.
Total recorder [totrec22.zip] : 906191 bytes
Fundamental tool for sound
streams capture, dead easy to crack, see fu_softi.htm
[Credit
card generators] [Password busters] [Port listeners, pingers and
tracerouters]
[Languages & useful
books]
[Checkers, sniffers,
whistles] [URL obfuscators] [Email IP address
spoofers] [Software
customizers]
[Corporate
countermeasures]
Credit card generators
Only to
screw commercial porn-sites... Should NEVER be used for something illegal,
never! Btw: I have found that Eurocard/Mastercard numbers with expirations 4-5
months ahead of the actual date work best...
cmaster4.zip ~
99792 bytes ccmaker.zip
[When people want data, we gently give them some
data: everybody is happy]
Most useful tool, must have when somebody on
the web asks for a creditcard number in order to "verify" things...
ccmaker.zip ~ 7201
bytes ccmaker.zip
[When people want data, we gently give them some data:
everybody is happy]
Most useful tool, must have when somebody on the web
asks for a creditcard number in order to "verify" things...
Very important to
gain access to data-bases that do not collaborate, should you have lost your
own password... As you'll quickly learn, a good entry (combo) list speeds
things up... and a good proxy list will keep you alive!
(See Passwords lore)
wwwhack.zip ~
210391 bytes wwwhack.zip
[When fred ~ fred doesn't work, but you need
to gain access nevertheless]
Most useful tool, must have when
somebody dares denying you access somewhere... the timelimiting
functions are easy to disable.
Careful when using
more recent versions! They malbehave: connect with servers on
your lan, sniff and send data around in the background!
"Hi Fravia,
I was on the tools page and downloaded a tool called wwwhack.zip; this tool
expires December 31, 2000. However I ran the software using 'Date Cracker 2000'
(zipped/dc200exe.zip) and used a simulated run date of 'December
31, 2000'... WWWHack works great, now.
I beleive this tip will be helpful to other readers"
(Neil)
ares.zip ~
1598100 bytes ares.zip [When fred ~ fred doesn't work, but you need
to gain access nevertheless] Most useful tool, must have when
somebody dares denying you access somewhere... remember to save your
proxy list as "proxy.ini" inside ares' working
subdirectory. Do not use hostnames in your proxy lists, just numeric
IPs! Use a good combo username/password list!
|
Precious Item
|
accessdiver43.zip
~ 1641805 bytes accessdiver43.zip version 4.3
[When fred ~ fred
doesn't work, but you need to gain access nevertheless]
Most
useful tool, must have when somebody dares denying you access somewhere.
Worth experimenting with, eheh
goldeneye.zip
~ 650352 bytes goldeneye.zip version 1.0 [When fred ~ fred doesn't
work, but you need to gain access nevertheless] Most useful tool,
must have when somebody dares denying you access somewhere. Worth
experimenting with, eheh. Do not forget to set the speed slider to a significant digit: default zero
won't work, duh |
Precious Item
|
apdfprp.zip ~ 738241 bytes Advanced PDF Password Recovery Pro 2.12
[When those annoying pdf-files dare to confront you]
Decrypt protected Adobe Acrobat PDF files, which
have "user" and/or "owner" passwords set,
preventing the file from opening or editing,
printing, selecting text and graphics etc.
|
Precious Item
|
|
Port listeners, pingers &
tracerouters |
Very important to discover who is listening
where
netmon09.zip ~
256655 bytes netmon09.zip
[Let's log all covert
activities]
Netmonitor, version0 .9: useful tool, log everything that
listens
inzider.zip ~
210391 bytes inzider.zip
[Who is listening where?]
Inzider, version
1.2: useful tool, must have if you fear someone may be listening on your ports
á la BO...
netlab.zip ~ 228735
bytes netlab.zip
[Swiss pinging knife]
Netlab, version 1.35, by
Alexander Danileiko (1997): useful tool, must have for pinging, tracerouting
and port-listening...
Netlab, upon starting, contacts the time server at 198.83.19.241 through port 37
nc11nt.zip ~ 96561
bytes netcat.zip
[the Swiss Army Knife of TCP/IP]
Netcat, version 1.10, by
Hobbit: useful tool, must have tool! See Angela Zaharia's essay
A simple example of using Netcat is to pull down a web page from a web
server.
With Netcat you get to see the full HTTP header so you can see
which web server a particular site is running.
ipticker.zip ~ 29212
bytes IPTICKER (For windoze 2k & XP only)
[Monitor ALL your Internet connections]
ipTicker is a diagnostic tool that detects and measures IP (internet protocol) traffic to and from your PC.
It listens to all ports and reports the activities centrally on its screen in real time.
By http://www.soft-trek.com.au.
Very useful tool, small, not intrusive, powerful. But *very badly* protected:
:4039BE E833DFFFFF call 4018F6
:4039C3 85C0 test eax, eax
:4039C5 7512 jne 4039D9 ; jne "good guy"
:4039C7 6824D34000 push 40D324 ; --> "ipTicker v1.6 (U N R E G I S T E R E D V E R S I O N)"
So if somebody wants to be a "good guy" he just modifies the ONE byte in blue above, turning that jump if not equal into
a jump if equal instruction...
I believe that the programmers at soft-trek should learn [some
better tricks] to protect their software.
ethereal092.zip ~ 7089400 bytes, ethereal092.zip ETHEREAL!
(Version 0.92) eh :-) The best Network protocol analyzer. Trace
everything, investigate, check what's going on! CATCH spywares
REDHANDED! |
Precious Item
|
Checkers, sniffers, whistles
Know what's going on inside a windoze box
winsight.zip ~
165169 bytes winsight.zip
[Whoa! All those programs are running on my
pc?]
winsight, version 2.05: useful Borland's tool, have a look, lotta
windows eh :-) Trace messages, investigate, check what's going on!
belarcadvisor.zip ~
606129 bytes BELARC ADVISOR!
Will show, on a html page, EVERYTHING that has been installed on the box where you are using it, with serial numbers :-)
Yep, System serial number, "Software LIcenses" like Microsoft XP's serial, Network Card MAC Address, and so on.
Didactically important tool as well, coz it shows you all the
data that windoze leaks around.
regrun2.zip ~
831086 bytes regrun2.zip
[Clear all misteries for windoze's configuration
and all sort of start up wonders]
Regrun2, version 2.25: an useful tool
to explore, check or change your configuration files, have a look. Trace,
investigate, check what's going on with this good tool!
An incredibly
simple protection scheme: the serial number routine is calculated from a name
/ email message combination that accepts one letter names as well (very bad
protectetiquette!) and shifts 0xF downwards based on the emailaddress (let's
say for instance that "a" at bozo@liveshere.com is 349120 and "b" at
bozo@liveshere.com is 349104, you'll guess that "c" will be 349088, and so on
:-) I believe that the programmers at Greatis should learn [some
better tricks] to protect their software.
regcle34.zip ~
251475 bytes regcle34.zip RegCleaner, by Jouni Vuorio, a GREAT tool.
Freeware. Does MUCH MORE than those expensive 'automatic' registry cleaners.
Try it! Search for "gator" and
"cmesys" on your own system, and you may have some
surprises... Inter alia it automatically removes all kinds
of junk from the registry. Corrupted data is also removed from the
registry. I say "inter alia" because this tool can have different uses
as well, as Vuorio points out: "Say you've accidentally destroyed a
nice shareware program what has a 30-day trial period. Later on, when
you notice that it's been destroyed, you try reinstalling it, only to
find out that you can't, because the program thinks that you're just
trying to get another 30 days. If you first remove the program's
registry entries, however, you may very well be able to reinstall the
software and recover your trial period again." |
Precious Item
|
URL obfuscators
If you want (to hope)
that your sysads don't know where you are surfing :-)
unfrozen3.zip ~
62543 bytes unfrozen3.zip
[A pleasure to play with, create synonyms for
your preferred URLs]
Unfrozen3, by Glow Armageddon (glow(at)w3(point)to), beautiful small tool to obfuscate the
URLs you are browsing to. "Hostname converter", must have for all those that
prefer not to leak too explicit loggings... see PCHelp's essay How to Obscure Any URL for
some explanations.
Check also [son_33_1.htm]: Javascript obscure conversion by
sonofsamiam, part of the [obscure.htm] section
Check also [urlcalc.zip]: ~ 43844 bytes Dotted decimal IP conversion to other
valid bases & Reverse obfuscation of a URL by Shoki (see [shokiwcd.htm])
and de-obfuscators :-)
[Sourcerer version
1]: ~ 30870 bytes,
This is version 1.0 of this javascript decrypter, the sources are included
by
Mordred Magic tool for seekers
Email IP address spoofers
If you wish
to maintain a certain degree of anonymity with your friends :-)
euthan.zip ~ 176108
bytes euthan.zip
[The tools of the evil spammers can be of some use for the
sons of the light]
Euthanasia, an old email bomber program that works
great for just sending emails: spoofs the IP address as well as the return
address and x-mailer (unfortunately it only works with certain smtp relays:
some reveal the real address anyway: check it and find a relay that work
before using). Thanks malan!
Software customizers
If you wish to
kill ads, tweak whatever or re-enable some grayed options
customiz.zip ~
653537 bytes customiz.zip
[The customizer per anthonomasia, version
1.10]
You'll find this even more useful than poledit when your system
administrator or your software programmer has chosen to 'disable' some
options... :-)
See for instance how you can modify on the fly the
webferret bot in this
essay. See also another interesting use of the customizer (tweaking EULAs)
in this [conference of mine]
customiz.exe ~
692224 bytes: this is customiz.zip version 1.10 autoextracting as
exe
very useful when you need to perform some quick tweakings from -say-
a web-café ;-)
customiz.jpg ~
653537 bytes: this is customiz.zip version 1.10 masqueraded as a
jpg
This is the old "anti-corporate" *.jpg
trick. Just click right onto it and choose save as, it will work even if you
are in a corporate cage where evil sysads have disabled zip and exe
downloading ;-)
cust115.zip ~
272528 bytes: cust115.zip [The customizer per anthonomasia, version
1.15] A ridicolous time check protection... any kid could set all
FOUR occurrences of 000007D1 (if you have installed it in 2001) to -say-
00000BB9 with the result that the program will expire in 3001. (And if
that's not enough... set all four to 00000FA1 :-) Maybe the
good people at wanga should learn [some better
tricks] to protect this most useful appz.
|
Precious Item
|
Corporate countermeasures
Escape the
censorship dictatures!
httport.zip ~
382426 bytes httport.zip
[TCP/IP through HTTP tunneling client by Dmitry
Dvoinikov]
You'll find this quite useful if you'r blocked by a
proxy... see all necessary instructions here: [httport.htm]
stego.htm
Steganography
Where you will find various tools
to embed your data in various kind of covers (images, sounds, files)
codebar.zip
~ 50488 bytes codebar.zip (CODEBAR!)
[ole +ORC explained how important this is]
Old, small, useful.
I liked
Whitmore's answer on Usenet, some time ago, to a commercial zombie that
accused users of 'stealing' when browsing with our beloved killerads on, this
text has been slightly modified:
"Banner ads are really silly.
Lately some bastards advertisers have begonnen to take note and 'penalize'
people using junkbuster and other banner killing software. What their defense
of this criminal attitude boils down to is that commercial webmasters incur
business expenses, and are responsible for finding a business model that at
least covers those expenses. Customers don't care if they cover their
expenses, they just want (x) and are willing to pay (n) to get it. If you
offer (x) for free, it's not stealing if people take it without being forced
to read ads -- remember, they're not concerned with advertisers' costs, they
just want their own expense to be (n) or less (where (n) is assumed to be
positive, thus zero -- free -- is less than (n)). If advertisers don't cover
their expenses, that's a problem with their business model, not consumer
behavior. If they had content that is worth an "admission" (a very big if in
my experience) then go ahead and charge one! If they can't, then they'd better
find a better business model. Expecting unusual behavior and giving the lack
of that behavior such negative (and illogical and inappropriate) label like
"stealing" is not going to serve them in the long run."
Of course
the junkbuster and proxomitron methods, that are described elsewhere on my
site, are pretty effective per se.
Two Opera's [
plug-ins]!
[http://www.intermute.com/] Intermute
[http://www.webwasher.com/] Webwasher, fairly easy to set up, and does away with
unwanted advertising, and other forms of annoying behavior from webpages.
[ao201.zip] Adsoff! 144919 bytes, original location:
http://www.intercantech.com, easy to crack... but you should buy this appz, it
deserves it.
[aaw562.zip] AD AWARE! (Version 5.0 = 5.62) 849144 bytes, original
location: http://www.lavasoftUSA.com/, very
useful to nuke spywares.
[http://www.oreilly.com/openbook/] O'Reilly English Language Online Books
[Perl] Sams Teach Yourself Perl 5 in 21 Days
[ksoze_ps.htm] Ksoze's "Running Perl Scripts"
[kso_kps0.htm]: ksoze perl shell v0.0 (a small/simple perl shell,
good for testing & learning purposes, obviously fully commented and
portable)
[Perl to exe] 1.077.535 ytes. Perl2Exe is a command line utility for
converting Perl scripts to executable files.
[rebol031.zip] 129961 bytes (see the bots section)
[A laboratory for PHP
experiments] by Laurent & DQ, (on
my Swiss mirror)
|
The Handbook of Applied
Cryptography |
[The Handbook of Applied
Cryptography] by Menezes, van
Oorschot & Vanstone
|
Powerful firewalls for windoze &
proxies |
(the best firewall for windoze is unfortunately a commercial one:
Sygate Personal Firewall Pro, go grab its version 5.1 on the deep deep web :-)
[consl26.zip] 914258 bytes: Conseal PC Firewall for windoze 9x, Version 2.6
You'll enjoy the power and knowledge!
[fo-b2145]
~
[fo-b25ci]
BlackIce, one of the best personal firewalls around (the best one is Sygate, go grab it)
Good old Fosi seems to have spread it all over the web.
A possible alternative is
ZoneLabs Zone Alarm (Free edition) http://www.zonelabs.com
A possible alternative is Tiny Personal Firewall (free for personal use) at
http://www.webmasterfree.com/tpfw.html
[mproxy05.zip] 145807 bytes
MultiProxy is a multifunctional personal
proxy server you can install to protect your privacy by dynamically connecting
to non-transparent anonimizing public proxy servers only. You can also test a
list of proxy servers and sort them by connection speed and level of
anonimity.
For a couple of interesting lists see [pxylist1.txt] & [pxylist2.txt]
OUR_FRIEND_PROXOMITRON!
 | |
Scott Lemmon, Proxomitron Author, passed away at the age of 36 on May 1st 2004 :-(
|
|
ProxN44.zip ~ 1141224 bytes proxo.zip (PROXOMITRON! Version Naoko-4.4)
[there is no need to explain how important this little thing is - complete documentation inside]
ProxN45j.zip ~ 1136575 bytes proxo.zip (PROXOMITRON! June Version)
[there is no need to explain how important this little thing is - complete documentation inside]
Older version:
proxo.zip ~ 873971 bytes proxo.zip (PROXOMITRON! Version Naoko-3)
If you never used it, you'll find this so useful that you'll
wonder how comes you never used it before :-)
Check Oncle Faf goes inside proxomitron
|
Magical Item
|
How to input multiple proxies on the fly in Proxomitron, by
-Bone Digger
Copy your proxy list to your clipboard.
Click the Proxy button on the Proxomitron Main Window.
Click the Add button on the "External Proxy Selector" window.
Right Click in the "Enter New Proxy server" text box.
Choose Paste from the right click menu.
All unique proxies (i.e. those not already listed) from your clipboard will be added.
OR open the default.cfg file in a text editor.
Scroll to the [Proxies] section at the bottom.
Leave a full empty line below the "OpenLog = TRUE" and "Count = 1" line and paste or input your proxies one per line.
|
| You'll find various proxy lists here and one ready to be pasted
inside proxomitron here |
By all means, use Proxomitron together with
Opera: cosmic power for your seeking trips!
|
Our friend Proximodo?
A possible new alternative to proxomitron (still in early development stage) could be proximodo, by
Antony Boucher.
"Basically, Proximodo is a clone of a great piece of software called The Proxomitron,
developed by Scott R. Lemmon. Now that for sad reasons Proxomitron is unmaintained, I started this project to carry on the idea. Though a few Proxomitron features are still missing in Proximodo (mainly SSL support) the essential is already there: 100% of Proxomitron filters will run under Proximodo (plus there is a menu to import your custom Proxomitron filters).
Proximodo currently comes with default Proxomitron filters, which can do quite a lot of different things.
But you can write your own filters, using a powerful syntax that, despite its seeming complexity, is quite easy to use and master."
Grisoft AVG Anti-virus (Free edition) http://www.grisoft.com
[w32gwiz.zip], ver 1.01 493706 bytes, by Vitaly (VitalyATATATTAODOTDOTDOTde)
"Win32 Game Wizard permits the user to modify the games so
that they can be much easier finished. It allows the user to customize games.
It removes protection, adds infinite lives, infinite weapons, etc."
[MemRead_BIN.zip] 133734 bytes, by ivo andonov (iDOTDOTDOTandonovATATATgallup-bbssDOTDOTDOTcom)
Let's see, ahem, if you undertand WHY the following
could be quite useful... remember old dos SICE 'snappings'? :-)
- Lists all processes and their modules currently running on the system.
- Lists the memory pages used by the selected process.
- Filter on the memory pages.
- Lists windows associated with each process
- Follower that will show the region occupied by each window you select
- Read/Write to other processes memory.
- Search in the memory pages selected from the list.
- ASCII search (automatic standard and UNICODE). Type ["something] (without the brackets) to search for "something"
- Binary
search. Type some numbers (for example 10 20 30) to search for the bytes
10 20 and 30. You can change from hex to dec using $ and # symbols. For example
the following search ($10 #20 $14 15) will search for $10 $14 $14 and $15
- Currently the search is byte oriented
- Remember the current state of a selected region of memory pages (like GameWizard).
- Search for changes in the remembered region.
- Search for differences. Using this search I found the address where Minesweeper
keeps the array of the play field. I have created a Minesweeper trainer.
- Search for increments
- Search for decrements
- Currently the search is byte oriented.
[hip20.zip], ver 2.0, 375501 bytes, by Davi Tassinari de Figueiredo (davitfATATATusaDOTDOTDOTnet)
A wondrous tool for file-hiding purposes, allows you to conceal
files inside bitmaps, using a password. This program version was published in may 2001.
Since Davi gives you the source code (260334 bytes)
as well, you can apply slight modifications: no echelon will ever be able to fech you on
the fly (unless they have you as a target).
This version is quite fast and relatively safe.
This is a DOS/Windows interface, a Linux one will eventually appear.
(c) III
Millennium: [fravia+], all rights reserved
Finally... Cosmic and Tactical depths |
Finally, since you are on my main "download" page, some old
gems, just in order to grasp how insignificant "we and our worries"
are, and how important it is to AVOID taking ourself too much seriously.
First take a look at the real small place our galaxy
has in the universe, through [this wondrous program], that every father should show to
his kids in
"relativising" awe... funny isn't it?
Mortals are at the same time nothing of
relevance and yet they have so much to give...
What? You still have a lot of time to
waste? Learn for free some strategy (and delve into such tactical depths)... and of
course, while playing, do not forget
to apply some sound theory to your virtual soldiers! :-)