Welcome to the THC release section. Below you will find the collection
of THC software applications. It includes sophisticated network
analysis and penetration test tools, cryptographic utilities
and a lot of other interesting stuff for the security
|Version: 3.1||Date: 2003-11-15||OS: Unix||Size: 61kb|
This is the best secure data deletion toolkit!
If you overwrite a file for 10+ times, it can still be
recovered. Read why and use the programs included (w/src!).
These tools can wipe files, free disk space, swap and memory!
Changes: Linux LKM for secure file deletion included, small bufixes.
|Version: 0.2.0||Date: 2003-07-18||OS: Unix||Size: 135kb|
Project website: /thc-shagg|
THC-Shagg is an application to bruteforce
check digit algorithms. It analyses a given list of
serial numbers and tries to find a matching algorithm
and its setup. If such a setup is found, THC-Shagg is
able to generate (extrapolate) new serial numbers, e.g.
VISA and MasterCard credit card numbers, EAN numbers,
IMEI, UPC or even EFT routing numbers.
|Version: 0.0.7||Date: 2005-05-28||OS: Unix||Size: 93kb|
Project website: /thc-snooze|
Snooze is the next-generation sniffing tool, supporting
modularized protocol dissectors and remote log file retrieval.
Modules are written in the high-level language LUA and are easy
to develop and extend, even during runtime. Supported protocols:
POP3, IMAP, FTP, RLOGIN, TELNET and others.
|Version: 1||Date: 1998-03-20||OS: Unix||Size: 67kb|
A compilation of needfull unix
hacking tools including
backdoors, tunnels, cleaners,
written by THC members,
compile on various unix
|Version: 2.1.1||Date: 2003-12-19||OS: Linux||Size: 27kb|
THC-vlogger, an advanced linux kernel based keylogger, enables the
capability to log keystrokes of all administrator/user's sessions via
console, serial and remote sessions (telnet, ssh), switching logging
mode by using magic password, stealthily sending logged data to
centralized remote server. Its smart mode can automatically detect
password prompts to log only sensitive user and password information.
|Version: 0.6||Date: 2003-08-10||OS: Unix||Size: 37kb|
Vmap stands for version mapper. It allows you to find out the version
of a daemon by fingerprinting the features and replys of bogus
commands. It's a great addition to the other *map tools.
|Version: 2.3||Date: 2001-10-27||OS: Linux||Size: 27kb|
THC-WarDrive is a tool for
mapping your city for wavelan
networks with a GPS device
while you are driving a car
or walking through the streets.
It is effective and flexible,
a "must-download" for all
|Version: 0.1||Date: 2004-08-12||OS: Linux||Size: 69kb|
Project website: /thc-yaotp|
Yaotp (Yet Another One-Time Pad) is a small tool that implements
the one-time pad cipher for en- and decryption of messages. It
features real random number generation by audio sampling and
hashing, key management that enforces one-time usage and
irreproducible key destruction. It is the right choice for the
totally paranoid geek and high-security issues beyond any