Tails is a Debian based live CD/USB with the goal of providing complete Internet anonymity for the user.
Software used for 'hacking', privacy, etc.
Tails is a Debian based live CD/USB with the goal of providing complete Internet anonymity for the user.
OpenVPN is a full-featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site-to-site VPNs, Wi-Fi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls. Starting with the fundamental premise that complexity is the enemy of security, OpenVPN offers a cost-effective, lightweight alternative to other VPN technologies that is well-targeted for the SME and enterprise markets.
Known as "the world's most resilient BitTorrent site", The Pirate Bay is a website that lets you search for, download, and upload torrents. Download music, movies, games, software and much more.
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
Extensible, open-source network mapper with OS detection to scan networks for hosts and services.
WikiLeaks is a website that publishes submissions of private, secret, and classified media from anonymous news sources and news leaks. Its aim is to reveal unethical behaviour in their governments and institutions.
Deluge is a full-featured BitTorrent client for Linux, Unix and Windows. It is written in python, uses libtorrent (rasterbar) at its core and GTK for the main user interface along with web and console interfaces for advanced client/server facility.
Deluge features a rich plugin collection; in fact, most of Deluge's functionality is available in the form of plugins.
Deluge was created with the intention of being lightweight and unobtrusive. It is our belief that downloading shouldn't be the primary task on your computer and therefore shouldn't monopolize system resources.
Deluge will work just fine across many desktop environments such as GNOME, KDE, XFCE and others.
µTorrent is an ad-supported, proprietary BitTorrent client owned and developed by BitTorrent, Inc.
The Social-Engineer Toolkit is an open source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly.
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version.
Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system.
There are already several login hacker tools available, however none does either support more than one protocol to attack or support parallized connects.
It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD/OpenBSD, QNX (Blackberry 10) and MacOS.
Currently this tool supports the following protocols: Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-POST, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTPS-POST, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, RTSP, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.
GNU Wget is a free software package for retrieving files using HTTP(S) and FTP, the most widely-used Internet protocols. It is a non-interactive command line tool, so it may easily be called from scripts, cron jobs, terminals without X-Windows support, etc.
A low-cost, capable little PC which can be used for many of the things that your desktop PC does, like games, spreadsheets and word-processing. It also plays high-definition video. We want to see it being used by children and young people all over the world to learn programming.
Code collaboration version control. Offers hosted (freemium) for limited (5) users, and a commercial self-hosted for a subscription. Free licenses are available for qualified open source projects, nonprofits, and classrooms.
GitHub is a web-based hosting service for projects that use the Git revision control system. It is written in Ruby on Rails by Logical Awesome developers Chris Wanstrath, PJ Hyett, and Tom Preston-Werner. GitHub offers both commercial plans and free accounts for open source projects.
The site provides social networking functionality like feeds, followers and the network graph to display how developers work on their versions of a repository.
GitHub also operates a pastebin-style site at gist.github.com, wikis for the individual repositories and web pages that can be edited through a git repository.
GitHub has a built-in, highly functional Issue Tracker.
Bitcoin is a peer-to-peer digital currency. Peer-to-peer (P2P) means that there is no central authority to issue new money or keep track of transactions. Instead, these tasks are managed collectively by the nodes of the network.
Bitcoins can be sent easily through the Internet, without having to trust middlemen.
Transactions are designed to be computationally prohibitive to reverse.
Be safe from instability caused by fractional reserve banking and central banks. The limited inflation of the Bitcoin system’s money supply is distributed evenly (by CPU power) throughout the network, not monopolized by banks.
WiGLE (Wireless Geographic Logging Engine)
We consolidate location and information of wireless networks world-wide to a central database, and have user-friendly java (JiGLE), windows (DiGLE), MacOSX (TinGLE) and web applications that can map, query and update the database via the web API. .
Browse through over 150 billion web pages archived from 1996 to a few months ago.
The Internet Archive is a non-profit online-application that was founded to build an Internet library. Its purposes include offering permanent access for researchers, historians, scholars, people with disabilities, and the general public to historical collections that exist in digital format. The Internet Archive includes texts, audio, moving images, and software as well as archived web pages in our collections, and provides specialized services for adaptive reading and information access for the blind and other persons with disabilities.
Use the Chrome and the Firefox extension to automatically replace 404 error pages with archived versions of websites.
OpenSSH is a free version of the SSH connectivity tools that technical users rely on. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.
Hyper™ is a beautiful and extensible, cross-platform terminal built on open web standards. It provides an elegant command-line experience that is consistent across all supported platforms which includes macOS, Windows and various Linux distributions like Fedora and Debian.
For developers, extensions are universal Node.js modules loaded by both Electron and the renderer process.
Screen sharing software that lets you connect to a remote computer anywhere in the world.
WifiKill is the best wifi controller app for any Android device. It can disable internet connection or control over a device's network activity when the device is connected to the same network. WifiKill Pro apk is the best wifi app for Android to control wifi network and modify the bandwidth usage. WiFiKill apk free download is the best choice for Android to allocate more bandwidth to yourself in any shared WiFi network!
(from official website)
Searx is a metasearch engine, aggregating the results of other search engines while not storing information about its users.
Why use Searx?
If you do care about privacy, want to be a conscious user, or otherwise believe in digital freedom, make Searx your default search engine or run it on your own server
Technical details - How does it work?
Searx is a metasearch engine, inspired by the seeks project.
It provides basic privacy by mixing your queries with searches on other platforms without storing search data. Queries are made using a POST request on every browser (except chrome*). Therefore they show up in neither our logs, nor your URL history. In case of Chrome* users there is an exception, Searx uses the search bar to perform GET requests.
Searx can be added to your browser's search bar; moreover, it can be set as the default search engine.
VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 2.
Presently, VirtualBox runs on Windows, Linux, Macintosh, and Solaris hosts and supports a large number of guest operating systems including but not limited to Windows (NT 4.0, 2000, XP, Server 2003, Vista, Windows 7, Windows 8, Windows 10), DOS/Windows 3.x, Linux (2.4, 2.6, 3.x and 4.x), Solaris and OpenSolaris, OS/2, and OpenBSD.
Virtualbox is available in 28 languages.
FileZilla is a powerful FTP-client. It has been designed for ease of use and with support for as many features as possible, while still being fast and reliable.
Security and digital forensics focused Linux distribution with over 600 pre-installed penetration testing apps.
Arch Linux is an independently developed, i686- and x86_64-optimised GNU/Linux distribution targeted at competent Linux users. It uses pacman, its home-grown package manager, to provide updates to the latest software applications with full dependency tracking. Operating on a rolling release system, Arch can be installed from a CD image or via an FTP server. The default install provides a solid base that enables users to create a custom installation. In addition, the Arch Build System (ABS) provides a way to easily build new packages, modify the configuration of stock packages, and share these packages with other users via the Arch Linux user repository.
The Linux kernel is the operating system kernel used by the Linux family of Unix-like operating systems.
Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners such as Nexpose - for free. This helps prioritize remediation and eliminate false positives, providing true security risk intelligence. IT professionals can demonstrate the impact of vulnerabilities to IT operations to obtain buy-in for remediation.
Discover which devices are connected to any Wi-Fi network, map devices, detect intruders, assess network security risks, troubleshoot network problems and achieve best network performance.
The most complete and advanced IT security professional toolkit on Android.
IoT (Internet of Things) search engine for finding and getting details about internet connected devices.
Installing Magisk will give you ROOT, a super powerful Systemless Interface, Magisk Modules support, and hide from tons of integrity tests like SafetyNet!.
App Cloner is a specialized tool that lets you create and install copies of your existing Android apps so you can do things like utilize multiple logins at various apps such as Facebook and Skype.
KDE Connect is a project that aims to communicate all your devices. For example, with KDE Connect you can receive your phone notifications on your computer, or just use your phone as a remote control for your desktop. To achieve this, KDE Connect implements a secure communication protocol over the network, and allows any developer to create plugins on top of it. Currently there are KDE Connect clients on KDE, Android and Blackberry, and soon we will support iPhone as well.
DeepSound is a steganography tool and audio converter that hides secret data into audio files. The application also enables you to extract secret files directly from audio files or audio CD tracks.
Extensible, cross-platform text editor with a rich ecosystem of plugins and themes.
Vim ("Vi IMproved") is an advanced text editor that allows syntax highlighting, word completion and has a huge amount of contributed content. It also has a GUI version called GVim.
Guerrilla Mail gives you a disposable email address. You can give your email address to whomever you don't trust. You can read the email using Guerrilla Mail, click on any confirmation link, and even reply. .
Secure email with absolutely no compromises, brought to you by MIT and CERN scientists.
ProtonMail is incorporated in Switzerland and our servers are located in Switzerland. We are outside of US and EU jurisdiction and all user data is protected by strict Swiss privacy laws.
Because of our end-to-end encryption, your data is already encrypted by the time it reaches our servers. We have no access to your messages, and since we cannot decrypt them, we cannot share them with third parties.
ProtonMail works out of any modern web browser, there is nothing to install. We are also backwards compatible with other email providers so you can continue sending and receiving emails from friends who are not using ProtonMail.
We believe privacy is a fundamental human right and should be available for everyone. That's why we offer multi-tiered pricing including a free version that anyone can use. Let's bring privacy back to the people!
We do not log IP addresses or require any personal information to sign up. We accept bitcoin and cash payments for paid accounts to ensure even paid account users have complete privacy.
ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones. It's as simple as visiting our site and logging in. There are no plugins or apps to install - simply use your favorite web browser.
Firefox Developer Edition brings you latest features, fast performance, and the development tools you need to build for the open web. Its powerful development tools will extend your ability to work across multiple platforms from one place.
Firefox DevTools features:
DuckDuckGo is an alternative search engine that has rich features, respects your privacy, and is built from free/open-source software.
• Zero-click Info - Useful information above the links.
• More Privacy - We do not track you.
• Goodies - Instant answers, !bangs & settings.
• Less Spam - We remove sites with just ads.
A free instant messaging and collaboration software based on the Matrix protocol.
The Kali Linux NetHunter project is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive Security. NetHunter supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as BadUSB MITM attacks – and is built upon the sturdy shoulders of the Kali Linux distribution and toolsets. Whether you have a Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10 or OnePlus One we’ve got you covered.
TextSecure and RedPhone have been merged to create Signal!
Using Signal, you can communicate instantly while avoiding SMS fees, create groups so that you can chat in real time with all your friends at once, and share media or attachments all with complete privacy. The server never has access to any of your communication and never stores any of your data.
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.
uTorrent isn't good for privacy since it's closed source and propriatery, use qBittorrent, Deluge or Transmission (Tribler is also good but it's experimental)
you shouldn't be using uTorrent anyway its basically a virus. it can download programs without asking and they've also distributed adware and bitcoin miners in the past lol
Great list. Thanks for compiling.
I always enjoy seeing software I wasn't already familiar with;
In addition to the many programs you listed: I also find the following very useful at times:
Popcorn Time - great for movies.. (all movies, especially new releases).
Truecrypt/Veracrypt - excellent file/drive encryption tools.
Lastpass - password management.
Private Internet Access - best paid - VPN.
KeyScrambler - anti keylogger.
Bitnami - pre-built virtual machine platforms.
Owncloud, nextcloud - to save and edit documents on server
ZeroNet - P2Pchat / forums / social network
[Edited by mcl12345, May 06]