Welcome to the THC release section. Below you will find the collection
of THC software applications. It includes sophisticated network
analysis and penetration test tools, cryptographic utilities
and a lot of other interesting stuff for the security
|Version: 1.0||Date: 2001-09-11||OS: Windows NT/2000||Size: 34kb|
CUPASS uses techniques to guess the password of ANY user
on a WindowsNT/W2K server or domain.
CUPASS uses a flaw in the implementation of Microsofts
NetUserChangePassword API to guess/change the users password.
This release is the proof of concept code for the THC paper
"CUPASS and the NetUserChangePassword Problem"
THC-Dialup Login Hacker (UNIX)|
|Version: 1.1||Date: 2003-06-25||OS: Unix||Size: 14kb|
Long, long time ago, we released a tool called Login Hacker, for
penetrating dialup modems. Today we are releasing a similar and easier
tool for Linux which does the same job better. All you need is UNIX
and minicom. Have fun with this little release!
|Version: 1.5||Date: 2002-08-07||OS: Unix||Size: 4kb|
Flood Connect is a connection flooding tool which supports SSL,
sending + dumping data, closing or keeping sessions etc. Just a small
release. Have fun.
|Version: 0.0.8||Date: 2003-10-25||OS: Unix||Size: 197kb|
Project website: /thc-ffp|
This little tool generates fuzzy fingerprints as described in
the corresponding paper. It is an ideal extension to
man-in-the-middle attacks against the SSH service. The current
version supports RSA and DSA key generation and MD5 and SHA1
|Version: 1.0||Date: 1995-10-15||OS: DOS/DOSemu||Size: 55kb|
General Dialer is an oldschool blueboxing tool which
is able to use 5-frequency-trunks with volume ramp
and scale support for each frequency entry. Additional features
include: C4, C5, C6, f/b R2, DTMF dialing and a
a mini-scanner for PBX- and VMB-systems. The original
version has been released in 1995.
|Version: 1.5||Date: 1996-01-26||OS: DOS/DOSemu||Size: 31kb|
Small program to filter out
important accounts from
unix passwd files.
|Version: 0.3||Date: 2003-08-09||OS: Unix||Size: 14kb|
Grenzgaenger is a Socks-based tool for tunneling nmap, netcat and
exploits transparently through systems into protected networks. This
tool is in ALPHA state!
|Version: 0.9||Date: 1999-10-20||OS: Windows/Wine||Size: 278kb|
|Version: 7.4.2||Date: 2099-01-01||OS: Unix||Size: 651kb|
Project website: /thc-hydra|
THC-Hydra - the best parallized login hacker: for
Samba, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL,
VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support
and is part of Nessus. Visit the project web site to download
Win32, Palm and ARM binaries. Changes in 5.4: Several speed
improvements, bug fixes and a few enhancements! NOTE: We need
people to rewrite modules - please contact vh(at)thc(dot)org
|Version: 1.0||Date: 2002-03-11||OS: NT4/W2K||Size: 20kb|
IPF is the first command line tool for configuring the packet filter
of Windows NT4
and Window 2000 systems. It replaces the annoying GUI alternatives
be used as an elegant entry for writing advanced firewall scripts
under the Windows
THC-IPv6 Attack Toolkit|
|Version: 2.3||Date: 2099-01-01||OS: Unix||Size: 173kb|
Project website: /thc-ipv6|
THC is proud to be the first who are releasing an comprehensive
attack toolkit for the IPv6 protocol suite. It comprises of
state-of-the-art tools for alive scanning, man-in-the-middle
attacks, denial-of-service etc. which exploits inherent
vulnerabilities in IPv6. Included is a fast and easy to use
packet crafting library to create your own attack tools.
|Version: 1.0||Date: 2005-02-13||OS: Unix||Size: 10kb|
Keyfinder analyses files for public/private keys, encrypted or
compressed data. It identified such areas by measuring the
entropy, arithemtical mean and counter checking, and dumps
appropriate file sections.
|Version: 0.1||Date: 2004-02-10||OS: Unix||Size: 170kb|
The THC LEAP Cracker Tool suite contains tools to break the
NTChallengeResponse encryption technique e.g. used by Cisco Wireless
Also tools for spoofing challenge-packets from Access Points are
included, so you are able to perform dictionary attacks against all
|Version: 1.1||Date: 1996-04-14||OS: DOS/DOSemu||Size: 147kb|
Powerfull script language to
terminal logins via
Configurable for telnet and
hacking, extreme large
|Version: 1.3||Date: 2004-07-21||OS: Unix||Size: 6kb|
Search data on a harddisk/partition/file, extract the part you
are interested in, and write it back after you modified it.
Useful to find and modify really all unencrypted Logfiles on a
system. Does everything in RAW mode, and hence does not tamper
|Version: 1.0||Date: 2007-06-02||OS: Windows/Wine||Size: 6776kb|
Project website: /thc-orakel|
THC-Orakel is a tool suite for analysis of the database
authentication mechanism used in Oracle products. Provided are
utilities for sniffing and breaking authentication password
on the wire within seconds.