Welcome to the THC release section. Below you will find the collection
of THC software applications. It includes sophisticated network
analysis and penetration test tools, cryptographic utilities
and a lot of other interesting stuff for the security
|Version: 0.2.0||Date: 2003-07-18||OS: Unix||Size: 135kb|
Project website: /thc-shagg|
THC-Shagg is an application to bruteforce
check digit algorithms. It analyses a given list of
serial numbers and tries to find a matching algorithm
and its setup. If such a setup is found, THC-Shagg is
able to generate (extrapolate) new serial numbers, e.g.
VISA and MasterCard credit card numbers, EAN numbers,
IMEI, UPC or even EFT routing numbers.
|Version: 1.0||Date: 2005-02-13||OS: Unix||Size: 10kb|
Keyfinder analyses files for public/private keys, encrypted or
compressed data. It identified such areas by measuring the
entropy, arithemtical mean and counter checking, and dumps
appropriate file sections.
|Version: 1||Date: 1998-03-20||OS: Unix||Size: 67kb|
A compilation of needfull unix
hacking tools including
backdoors, tunnels, cleaners,
written by THC members,
compile on various unix
THC Nokia Phone Unlock|
|Version: 1.0||Date: 2006-09-13||OS: Symbian||Size: 70kb|
Project website: /thc-nokia-unlock|
Removes the PHONE LOCK from Nokia mobile phones (6630, 6680,
...). A design flaw and an undocumented feature is exploited to
trigger a hard reset even if the phone is locked.
|Version: 2.0||Date: 2002-01-24||OS: Unix||Size: 5kb|
The Reverse-WWW-Tunnel-Backdoor is proof-of-concept Perl program
for the paper "Placing Backdoors through Firewalls". It allows
communicating with a shell through firewalls and proxy servers by
imitating webtraffic. The master/slave relation is reversed,
therefore no listening ports are used on the target machine.
THC-Orakel Crackert 11g [New]|
|Version: 1.0||Date: 2007-09-25||OS: Windows/Wine||Size: 4354kb|
Project website: /thc-orakelcrackert11g|
publicly available full blown cracker for Oracle 11g. This tool can
crack passwords which are stored using the latest SHA1 based
hashing algorithm. To speed up cracking, the tool exploits a
in the Oracle password storage strategy. Therfore, cracking - for
passwords - is still just as fast as it was before the introduction
|Version: 1.5||Date: 2002-08-07||OS: Unix||Size: 4kb|
Flood Connect is a connection flooding tool which supports SSL,
sending + dumping data, closing or keeping sessions etc. Just a small
release. Have fun.
|Version: 0.0.7||Date: 2005-05-28||OS: Unix||Size: 93kb|
Project website: /thc-snooze|
Snooze is the next-generation sniffing tool, supporting
modularized protocol dissectors and remote log file retrieval.
Modules are written in the high-level language LUA and are easy
to develop and extend, even during runtime. Supported protocols:
POP3, IMAP, FTP, RLOGIN, TELNET and others.
|Version: 1.3||Date: 2004-07-21||OS: Unix||Size: 6kb|
Search data on a harddisk/partition/file, extract the part you
are interested in, and write it back after you modified it.
Useful to find and modify really all unencrypted Logfiles on a
system. Does everything in RAW mode, and hence does not tamper
|Version: 4.1||Date: 1999-12-29||OS: Linux||Size: 644kb|
The ultimate host scanner
compilation for Linux,
featuring nmap, snmpscan,
netbios auditing tool and
super-cool vh shell script.
|Version: 0.0.8||Date: 2003-10-25||OS: Unix||Size: 197kb|
Project website: /thc-ffp|
This little tool generates fuzzy fingerprints as described in
the corresponding paper. It is an ideal extension to
man-in-the-middle attacks against the SSH service. The current
version supports RSA and DSA key generation and MD5 and SHA1
|Version: 0.6||Date: 2003-08-10||OS: Unix||Size: 37kb|
Vmap stands for version mapper. It allows you to find out the version
of a daemon by fingerprinting the features and replys of bogus
commands. It's a great addition to the other *map tools.
THC-RA Hacking Kit 2|
|Version: 2||Date: 1997-01-08||OS: DOS/DOSemu||Size: 42kb|
Backdoors, viris, traps and
RemoteAccess BBS hacking.
Sophisticated ways of
getting hidden into BBS
systems. Issue #2
|Version: 1.1||Date: 1995-11-24||OS: DOS/DOSemu||Size: 59kb|
A tool to automatically hack
pbx, handles up to 10
different pbx numbers with
features like random dialing,
dial/tone speed and
programmable and much
This will trick out any
pattern detection switch.
|Version: 1.0||Date: 2002-03-11||OS: NT4/W2K||Size: 20kb|
IPF is the first command line tool for configuring the packet filter
of Windows NT4
and Window 2000 systems. It replaces the annoying GUI alternatives
be used as an elegant entry for writing advanced firewall scripts
under the Windows
THC-Dialup Login Hacker (UNIX)|
|Version: 1.1||Date: 2003-06-25||OS: Unix||Size: 14kb|
Long, long time ago, we released a tool called Login Hacker, for
penetrating dialup modems. Today we are releasing a similar and easier
tool for Linux which does the same job better. All you need is UNIX
and minicom. Have fun with this little release!