Tag Archives: hacking

[v7.0, v7.3] CommView – Powerful wireless network monitor and analyzer

This article along with all titles and tags are the original content of AppNee. All rights reserved. To repost or reproduce, you must add an explicit footnote along with the URL to this article!
Any manual or automated whole-website collecting/crawling behaviors are strictly prohibited.
Any resources shared on AppNee are limited to personal study and research only, any form of commercial behaviors are strictly prohibited. Otherwise, you may receive a variety of copyright complaints and have to deal with them by yourself.
Before using (especially downloading) any resources shared by AppNee, please first go to read our F.A.Q. page more or less. Otherwise, please bear all the consequences by yourself.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

I think readers who understand wireless network well know that the security of wireless network comes with congenital deficiency – i.e.: the wireless signal is easy to leak. As a result, compared with the wired network, the monitoring action made to wireless network signals is much easier. CommView for WiFi is a powerful wireless network monitor and analyzer (i.e.: packets capturing and monitoring tool) with friendly UI, industry-leading performance, good flexibility and usability. It’s specially developed (by TamoSoft from New Zealand) for wireless network administrators, security specialists, network programmers, or anyone wanting to understand the wireless network communication clearly.

Continue reading [v7.0, v7.3] CommView – Powerful wireless network monitor and analyzer

[11.10] All Password List, Dictionary collection for various purposes

In this post, AppNee will continue to release all kinds of popular, long-tested password dictionaries with very high quality. All of them are proven by users from all over the world, so that any dictionary generated by tools can not be comparable to them. Moreover, they cover all application scopes, fields and uses (we will make the corresponding identification).

Continue reading [11.10] All Password List, Dictionary collection for various purposes

If some download link is missing, and you do need it, just please send an email (along with post link and missing link) to remind us to reupload the missing file for you. And, give us some time to respond.
If there is a password for an archive, it should be "appnee.com".
Most of the reserved downloads (including the 32-bit version) can be requested to reupload via email.

[v12.0] Acunetix – Top-level website security scanning tool

Nowadays, as many as 70 percent of websites have vulnerabilities that could lead to the theft of sensitive data of company (such as credit card information and customer info list). In particular, too many custom web applications are often not fully tested and contain a lot of undetected vulnerabilities, making them easily fall prey to hackers. There is no doubt that, the security of a website is very important, so as a website administrator, it is very necessary to conduct security penetration tests on their own servers.

Continue reading [v12.0] Acunetix – Top-level website security scanning tool

[v5.0] Spy Note – Fast and stable Android remote administration tool

Spy Note is a free Android RAT (Remote Administration Tool/Remote Access Trojan) program developed based on Java. Its Server is written in Java, and the Client controller is written in Visual Basic .NET. After installation on an Android device, Spy Note will automatically remove its on-screen icon from victim’s device.

Continue reading [v5.0] Spy Note – Fast and stable Android remote administration tool

Kali Linux 101 Video Training Courses in one package

Whether you wish to be a hacker who is interested in hacking wireless network, web app, database; cracking password, software….; or want to engage in cyber security related works in the future, Offensive Security‘s Kali Linux (a penetration testing OS) should be always your main “battlefield” and “experimental field”.

Continue reading Kali Linux 101 Video Training Courses in one package

cSploit – Successor of dSploit, most powerful network penetration testing toolkit

Two core developers of dSploit went separate ways in the fall of 2014. dSploit’s father merged it into the commercial zANTI 2 with ambition to build a series of security apps on Android platform. Meanwhile, the other founder (now cSploit‘s father) can’t wait the distant promise to open source of zANTI 2. Thus, he decided to fork the killed project and finish all the original dSploit To-Dos on a new core – cSploit, by himself.

Continue reading cSploit – Successor of dSploit, most powerful network penetration testing toolkit

[v1.1.3c] dSploit – Most popular penetration testing suite for Android

With the development of mobile devices and network, intelligent mobile phone has become a new paradise for hackers. Imagine, under this environment of everybody holds a smart phone nowadays, nothing is more active than the mobile phone viruses and the vulnerabilities’ exploits of software and mobile network. Therefore, to understand and master some practical security tools seems necessary and meaningful.
Continue reading [v1.1.3c] dSploit – Most popular penetration testing suite for Android