Top Penetration Testing Tools

1) Metasploit 

Metasploit pentesting tool

This is the most advanced and popular Framework that can be used to for pen-testing. It is based on the concept of ‘exploit’ which is a code that can surpass the security measures and enter a certain system. If entered, it runs a ‘payload’, a code that performs operations on a target machine, thus creating the perfect framework for penetration testing.

It can be used on web applications, networks, servers etc. It has a command-line and a GUI clickable interface, works on Linux, Apple Mac OS X and Microsoft Windows. This is a commercial product, although there might be free limited trials available.

Download link: Metasploit Download

2) Wireshark

Wireshark logo

This is basically a network protocol analyzer –popular for providing the minutest details about your network protocols, packet information, decryption etc. It can be used on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many other systems. The information that is retrieved via this tool can be viewed through a GUI, or the TTY-mode TShark utility.  You can get your own free version of the tool from here.

Download link: Wireshark download

3) w3af


W3afis a Web Application Attack and Audit Framework.

Some of the features are: fast HTTP requests, integration of web and proxy servers into the code, injecting payloads into various kinds of HTTP requests etc.

It has a command-line interface, works on Linux, Apple Mac OS X and Microsoft Windows.
All versions are free of charge to download.

Download link: w3af download

4) CORE Impact

CORE Impact

CORE Impact Pro can be used to test mobile device penetration, network/network devise penetration, password identification and cracking, etc. It has a command-line and a GUI clickable interface, works Microsoft Windows. This is one of the expensive tools in this line and all the information can be found at below page.

Download link: CORE Impact download

5) Back Track

Back Track

Back Track works only on Linux Machines. The new version is called Kali Linux. This is one of the best tools available for Packet sniffing and injecting. An expertise in TCP/IP protocol and networking are key to succeed using this tool. For information and to download a free copy, visit below page.

Download link: Back Track download

6) Netsparker

Netsparker logo

Netsparker comes with a robust web application scanner that will identify vulnerabilities, suggest remedial action etc. This tool can also help exploit SQL injection and LFI (local file induction). It has a command-line and GUI interface, works only on Microsoft Windows. This is a commercial product, although there might be free limited trials available at below page.

Download link: Netsparker download

7) Nessus

Nessus logo

Nessus also is a scanner and one that needs to be watched out for. It is one of the most robust vulnerability identifier tools available. It specializes in compliance checks, Sensitive data searches, IPs scan, website scanning etc. and aids in finding the ‘weak-spots’. It works on most of the environments.

Download link: Nessus download

8) Burpsuite

Burpsuite logo

Burp suite is also essentially a scanner (with a limited “intruder” tool for attacks), although many security testing specialists swear that pen-testing without this tool is unimaginable. The tool is not free, but very cost effective. Take a look at it on below download page. It mainly works wonders with intercepting proxy, crawling content and functionality, web application scanning etc.  You can use this on Windows, Mac OS X and Linux environments.

Download link: Burp suite download

9) Cain & Abel

If cracking encrypted passwords or network keys is what you need, then Cain& Abel is the tool for you. It uses network sniffing, Dictionary, Brute-Force and Cryptanalysis attacks, cache uncovering and routing protocol analysis methods to achieve this. Check out information about this free to use tool at below page. This is exclusively for Microsoft operating systems.

Download link: Cain & Abel download

10) Zed Attack Proxy (ZAP)

Zed Attack Proxy logo

ZAP is a completely free to use, scanner and security vulnerability finder for web applications. ZAP includes Proxy intercepting aspects, variety of scanners, spiders etc. It works on most platforms and the more information can be obtained from below page.

Download link: ZAP download

11) Acunetix

Acunetix logo

Acunetix is essentially a web vulnerability scanner targeted at web applications. It provides SQL injection, cross site scripting testing, PCI compliance reports etc. along with identifying a multitude of vulnerabilities. While this is among the more ‘pricey’ tools, a limited time free trial version can be obtained at below page.

Download link: Acunetix download

12) John The Ripper

John The Ripper logo

Another password cracker in line is, John the Ripper. This tool works on most of the environments, although it’s primarily for UNIX systems. It is considered one of the fastest tools in this genre. Password hash code and strength-checking code are also made available to be integrated to your own software/code which I think is very unique. This tool comes in a pro and free form. Check out its site to obtain the software on this page.

Download link: John the Ripper download

13) Retina

Retina logo

As opposed to a certain application or a server, Retina targets the entire environment at a particular company/firm. It comes as a package called Retina Community. It is a commercial product and is more of a vulnerability management tool more than a pen-testing tool. It works on having scheduled assessments and presenting results. Check out more about this package at below page.

Download link: Retina download

14) Sqlmap

Sqlmap pen test logo

Sqlmap is again a good open source pen testing tool. This tool is mainly used for detecting and exploiting SQL injection issues in an application and hacking over of database servers. It comes with command-line interface. Platform: Linux, Apple Mac OS X and Microsoft Windows are supported platforms. All versions of this tool are free for download.

Download link: Sqlmap download

15) Canvas

Canvas pen test logo

Immunity’s CANVAS is a widely used tool that contains more than 400 exploits and multiple payload options. It renders itself useful for web applications, wireless systems, networks etc. It has a command-line and GUI interface, works on Linux, Apple Mac OS X and Microsoft Windows. It is not free of charge and can more information can be found at below page.

Download link: Canvas download

16) Social Engineer Toolkit

Social Engineer Toolkit logo

The Social-Engineer Toolkit (SET) is a unique tool in terms that the attacks are targeted at the human element than on the system element. It has features that let you send emails, java applets, etc containing the attack code. It goes without saying that this tool is to be used very carefully and only for ‘white-hat’ reasons.  It has a command-line interface, works on Linux, Apple Mac OS X and Microsoft Windows. It is open source and can be found at below page.

Download link: SET download

17) Sqlninja

Sqlninja penetration testing

Sqlninja, as the name indicates is all about taking over the DB server using SQL injection in any environment. This product by itself claims to be not so stable its popularity indicates how robust it is already with the DB related vulnerability exploitation. It has a command-line interface, works on Linux, Apple Mac OS X and not on Microsoft Windows. It is open source and can be found at this page.

Download link: Sqlninja download

18) Nmap

Nmap logo

“Network Mapper” though not necessarily a pen-testing tool, it is a must-have for the ethical hackers. This is a very popular tool that predominantly aids in understanding the characteristics of any target network. The characteristics can include: host, services, OS, packet filters/firewalls etc.  It works on most of the environments and is open sourced.

Download link: Nmap download

19) BeEF

BeEF pen testing tool

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser- what this means is that, it takes advantage of the fact that an open web-browser is the window(or crack) into a target system and designs its attacks to go on from this point on . It has a GUI interface, works on Linux, Apple Mac OS X and Microsoft Windows. It is open source and can be found at this page.

Download link: BeEF download

20) Dradis

Dradis pen testing tool

Dradis is an open source framework (a web application) that helps with maintaining the information that can be shared among the participants of a pen-test. The information collected helps understand what is done and what needs to be done. It achieves this purpose by the means of plugins to read and collect data from network scanning tools, like Nmap, w3af, Nessus, Burp Suite, Nikto and many more.  It has a GUI interface, works on Linux, Apple Mac OS X and Microsoft Windows. It is open source and can be found at this page.

Download link: Dradis download

what is Spyware

Spyware: Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer’s consent, or that asserts control over a computer without the consumer’s knowledge

Spywares:  Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user. It also can download other malicious programs from internet and install it on the computer.Spyware works like adware but is usually a separate program that is installed unknowingly when you install another freeware type program or application.

Type of Spyeware

  • Desktop Spyware
  • Email and Internet Spyware
  • Child Monitoring Spyware
  • Audio Spyware
  • Video Spyware
  • Print Spyware
  • Screen Capturing Spyware
  • USB Spyware
  • Telephone/Cell phone Spyware
  • GPS Spyware

Desktop Spyware


Internet and Email Spyware


Child Monitoring Spyware


Screen Capturing Spyware


USB Spyware


Video Spyware


Telephone/Cell phone Spyware


GPS Spyware


Top Vulnerabilities

  • Command Injection

    Command injection is a technique, which allows an attacker to execute system commands by abusing an application feature. The injection typically occurs when the developer is using user input to construct an executable command specific to the pseudo system shell in use.

  • Default Login

    A default login is a kind of login, which is the same for every instance of the application. It’s typically used to grant a first time access to hardware bundled control panels and administration interfaces.

  • Local File Include

    A Local File Include is a vulnerability, which allows attackers to retrieve or execute server-side files. The vulnerability arises by the fact that the developer is allowing not sanitised user-supplied input to be used in functions used to open, read or display the content of files.

  • Remote Code Injection

    Remote Code Injection is a vulnerability, which allows an attacker to remotely inject code into an application in order to change its execution flow. The issue typically occurs due to the fact that the application is written in a language, which allows dynamic evaluation of code at runtime.

  • Remote File Include

    A Remote File Include is a vulnerability, which allows attackers to manipulate the application in order to include a remote file hosted on a 3rd-party server. This file may be executable, typically written in a scripting language.

  • SQL Injection

    SQL Injection is a code injection technique, which exploits a security vulnerability occurring in the database layer of a web application. The vulnerability is present when user input is incorrectly filtered for special characters embedded in a SQL statement and thereby unexpectedly executed, i.e. the input was injected into the SQL statement issued by the web application.

  • Weak Session Management

    This happens when the web application produces a session cookie, which value is easily guessable. For example the session may be based on UNIX timestamps or just an MD5 of a timestamp, etc.

  • Cross-site Scripting

    XSS is a type of web application security vulnerability, which allows code injection by malicious web users into the web pages viewed by other users.

  • LDAP Injection

    LDAP Injection is a Code Injection technique used against applications, which construct LDAP statement based on user input. LDAP is an application protocol used to access and maintain distributed directory services like Microsoft’s Active Directory.

  • Persistent Cross-site Scripting

    XSS is a type of web application security vulnerability, which allows code injection by malicious web users into the web pages viewed by other users.

    Stored Cross-site Scripting is a type of XSS where the injected content is permanently stored on to the web server/application. Whenever a user requests an infected page from the server the payload is directly delivered embedded in the response so it will be executed without the need of user intervention.

  • Reflected Cross-site Scripting

    XSS is a type of web application security vulnerability, which allows code injection by malicious web users into the web pages viewed by other users.

    Reflected Cross-site Scripting is a type of XSS where the injected code is reflected off the web server. This kind of XSS is short-lived and requires a phishing vector to be delivered to the victim.

  • XML Injection

    XML Injection is a Code Injection variant, which can be used by attackers to include malicious XML block, which is then used by an XML processor.

  • XPATH Injection

    XPATH Injection is a Code Injection technique which is used when an application uses user supplied data to craft XPATH queries to retrieve and write data stored in XML form.

  • Cross-site Request Forgery

    CSRF is an attack which forces an end-user to execute unwanted actions on a web application with which he is currently authenticated. Applications susceptible of this attack have no way to distinguish legit requests from forged ones.

  • Open Cross Domain Policy

    A Cross Domain Policy File is used to enforce the same origin policy in modern web applications (especially Flash and Silverlight based) by preventing some types of content from being accessed or modified from another domain via the client (a browser or a plugin). An open cross-domain is the vulnerability, which occur when the policy file explicitly allows every external domain.

  • CRLF Injection

    CRLF stands for Carriage Return Linefeed, which is a special sequence of characters (0x0D 0x0A in hex) used by the HTTP protocol as a line separator. A CRLF Injection attack occurs when an attacker manages to force the application to return the CRLF sequence plus attacker’s supplied data as part of the response headers.

  • Directory Traversal

    A Directory Traversal is a type of attack which aims to access files or directories that are stored outside the web root folder by injecting characters representing “traverse to parent directory” like ‘../’ in Unix. The goal of this attack is to force an application to access a file that is not intended to be accessible.

  • Frame Injection

    Frame Injection is a type of Code Injection attack where a frame is injected into the web application’s front-facing features. Usually the frame injected is a concealed iframe pointing to an attacker controlled page.

  • Inadequate Session Revocation

    This vulnerability occurs when the session is not properly revoked after an user logout request.

  • .NET Tracing Capabilities

    .NET provides powerful application debugging capabilities, which can be abused by attackers to obtain various pieces of critical information including session cookies and session state.

  • Open Redirect

    An Open Redirect is a vulnerability where the application takes user input to generate some form of redirection without validating the to-be-redirected-to location.

  • Response Splitting

    Response Splitting happens when not sanitised data is passed to the vulnerable application and it is used to build a response header. An attacker may force the web server to form a malformed output stream, which is then interpreted by the victim’s browser as two HTTP responses instead of one.

    Response splitting is usually useful only with proxies or when the browser is using request pipelining.

  • The “HTTPOnly” flag applies to the Set-Cookie HTTP response header to indicate that the cookie cannot be accessed by client-side code such as JavaScript, Flash, and other client-side components.

  • This flag applies to the Set-Cookie HTTP response header to indicate that the cookie cannot be sent by the browser over insecure channel such as HTTP.

  • Session Fixation

    This may indicate that the application suffers from a “Session Fixation” vulnerability.

  • Autocomplete Enabled

    Autocomplete is a HTML tag attribute used to disable the form auto completion mechanism of the browser.

  • Directory Listing Enabled

    Directory listings may disclose information about the web application and it’s environment that was not intended to be public.

  • Discovered SOAP Service

    SOAP (Simple Object Access Protocol) is a protocol specification for exchanging structured information in the implementation of Web Services. It’s based on XML and it’s primarily used to build API services.

  • Path Disclosure

    Usually this leak is due to descriptive application and server errors.

  • Source Leakage

    This may be due to a misconfigured server or application.

  • Additional Applications

    Unmaintained applications may come with bugs and security vulnerability and can be a threat to the security and integrity of the web server.

  • Common Files

    Common files are files which are usually left by automated/default installations that are not necessarily still required by the web application but may still contain sensitive information.

  • Dangerous Methods Enabled

    Uncommon HTTP methods like PUT, DELETE and all other WEBDAV methods are considered dangerous.

  • Debug Methods Enabled

    The HTTP methods TRACK and TRACE are usually used for debugging purpose.

  • Directory Listing Denied

    This error is generated when there is no index file in the requested directory and the server or application is not configured to reveal the directory contents. This, however, indicates that the directory exists.

  • File Upload

    File upload facilities are usually considered dangerous because they can be abused to leverage various types of attacks.

  • Microsoft Office Document

    Microsoft Office Documents often contain hidden metadata like username, author name, company name, the name of the computer, which was used to create the document and so on.

  • Open Cross-Origin Resource Sharing

    Cross-origin Resource Sharing (CORS) is a specification, which allows Web applications the ability to offer its resources for public consumption from different domains. CORS is typically used in cross-origin APIs designed to be consumed by JavaScript applications.

  • Password Via GET

    Sending passwords via GET parameter is considered a bad programming practice since this information can be easily read from the browser’s address bar, history or from the web server logs.

  • Permissive Cross-Origin Resource Sharing

    Cross-origin Resource Sharing (CORS) is a specification, which allows Web applications the ability to offer its resources for public consumption from different domains. CORS is typically used in cross-origin APIs designed to be consumed by JavaScript applications.

  • Redirect Response With Body

    This is often due to a programming error or a security problem.

  • Referer Leakage

    The HTTP Referer header is used to store the URL of the page from which the user is coming from. Confidential information about the user may be leaked if it is stored in query parameters used by the application.

  • Strict Transport Security

    This header is used to force browsers to connect to the application trough a SSL connection.

  • Version Control Files

    These files are used by version control software to store meta-data and configurations about the repository used to store the application’s source code.

  • ViewState Not Encrypted

    The ViewState is a field used in ASP.NET applications to save the current state of the application. If it’s used to store sensitive data, like user’s details, it should be properly encrypted to maintain the confidentiality of the data.

  • ViewState not Signed

    The ViewState is a field used in ASP.NET applications to save the current state of the application. To avoid data tampering the ViewState value should be signed by enforcing a MAC (Machine Authentication Check) mechanism.

  • X-Frame-Options Not Used

    This header indicates whether or not a browser should be allowed to render a page in a <frame> or <iframe> . Web applications can use this to avoid clickjacking attacks, by ensuring content is not embedded into other sites.

  • XSS Protection Disabled

    A basic XSS protection mechanism is present in every modern browser. This mechanism is active by default but may be disabled by setting the response header “X-XSS-Protection” to the value “0”.

  • CVE Finding

    CVE (The Common Vulnerabilities and Exposures) system provides a reference-method for publicly known information-security vulnerabilities and exposures.

  • Virtual Host Discovery

    Virtual Hosting is a method that allows a single server to serve resources for multiple web application. The presence of Virtual hosts usually indicate that the target application is sharing resources with other applications, i.e. shared-hosting environment.

Cain & Able Tool

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kinds of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol’s standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some “non standard” utilities for Microsoft Windows users.

 Download & Use

Windows Expert Tool 6.0

* Backup your Passwords saved in web browsers (Firefox, Google Chrome, e more)
* Backup Product Keys saved in all Microsoft Windows Operating Systems
* Backup Product Keys for Microsoft Office
* Backup Wirelles their passwords (WEP/WAP)
* Backup different passwords logins
* Backup passwords in instant messengers on
* Backup passwords in customer’s e-mail
* Backup passwords/data from your routers, your existing usb
* Compatible: Windows XP, Windows 7 Windows 8Windows 8.1
* Compatible: Windows X64, Windows X86
* It’s safe and fast

2 – Instructions: 

This program will recover saved passwords on your computer. 
Run as administrator. Some security tools (antivirus and others) detects ‘false-positive’.
If this occurs, simply: 

1 Disable your anti-virus/firewall 
2 Extract Windows Expert Tool and run Windows Expert tool.exe 
3 Wait for the program to work 
4 Turn on your anti-virus 
5 Enjoy 

Screenshot Password Recovered:

Password in Firefox Browser:

Download & Use 

Net Tools ( All in One hacking Tool)



Net Tools 5.0 (build 70) contains a whole variety of network tools. Here is a list of the most important tools:

1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online – Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
95) Hash MD5 Checker
96) Port Connect – Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer’s IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, … All protocols supported)
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) GeoLocate IP
154) Google PageRank Calculator
155) Google Link Crawler (Web Result Grabber)
156) Network Adapter Binder
157) Remote LAN PC Lister
158) Fast Sinusoidal Encryption
159) Software Scanner
160) Fast FTP Client
161) Network Traffic Analysis
162) Network Traffic Visualiser
163) Internet Protocol Scanner
164) Net Meter (Bandwidth Traffic Meter)
165) Net Configuration Switcher
166) Advanced System Hardware Info
167) Live System Information
168) Network Profiler
169) Network Browser
170) Quick Website Maker and Web Gallery Creator
171) Remote PC Shutdown
172) Serial Port Terminal
173) Standard Encryptor
174) Tray Minimizer
175) Extra Tools (nmap console & win32 version)

Go to Home Page & Free Download


Net Tools for Android 

NetTools is an utility suite. It has many apps to help network admins to monitor and test sites. It includes the followinf tools:-
* IP Resolver
* Whois
* Website Source Viewer
* Port Scanner
* Hexadecimal to Binary & Decimal converter
* PingMore tools will be added in the future.

The app is free to download from the Play Store (Android Market).

 Cover art

Web Link: –

Hidden Folder Trick

Show/Hide Hidden Files and Folders using Windows Registry . . .

IMPORTANT This article will guide to some steps to modify your Windows Registry. Stop if you’re not familiar with the Windows Registry. Making a wrong change on the Windows Registry could cause critical problems to your computer.

Proceed at your own risks 

  • Open the “Registry Editor” (“Start” >> “Run“, then type “regedit” and Enter).
  • Expand to the following key:
  • If the value “Hidden” exists, double-click on it to edit its value to (1 = show hidden, 2 = do not show)
  • If the value “Hidden” does not exist, create it as follows
    Name: Hidden
    Type: DWORD
    Value: 1
    (1: show hidden, 2: do not show)


Hide File and Folder

It is a 100% safe and free method to hide a file or folder from others in your system without

Using any application. For this, open dos prompt and type:

For Hide:

X:> attrib +a +r +s +h foldername /s /d [enter]

For unhide:

X:> attrib -a -r -s -h foldername /s /d [enter]

X= x is location for our folder in hard disk.