Welcome to the THC release section. Below you will find the collection
of THC software applications. It includes sophisticated network
analysis and penetration test tools, cryptographic utilities
and a lot of other interesting stuff for the security
THC Nokia Phone Unlock|
|Version: 1.0||Date: 2006-09-13||OS: Symbian||Size: 70kb|
Project website: /thc-nokia-unlock|
Removes the PHONE LOCK from Nokia mobile phones (6630, 6680,
...). A design flaw and an undocumented feature is exploited to
trigger a hard reset even if the phone is locked.
|Version: 5.4||Date: 2011-06-01||OS: Unix||Size: 257kb|
Project website: /thc-amap|
*THC 10th anniversary special release*
Amap is a next-generation scanning tool, which identifies
applications and services even if they are not listening on the
default port by creating a bogus-communication and analyzing
the responses. Changes: many more fingerprints, fix for SSL.
Voted into the top-50 security tool list!
|Version: 1||Date: 1996-03-24||OS: None||Size: 17kb|
The official At&t Security
Booklet "Don´t become a Toll
Victim" from the funky
by Wilkins and Plasmoid
|Version: 1.91||Date: 2001-03-30||OS: DOS/DOSemu||Size: 55kb|
World´s best Credit Card
Generator, checks and
generates over hundreds of
different card types including
bank ids and
standards. For all you horny
who always wanted an
account at Amateurs or
Dirtybird, NOW supporting
magnetic card reader and
|Version: 1.0||Date: 2001-09-11||OS: Windows NT/2000||Size: 34kb|
CUPASS uses techniques to guess the password of ANY user
on a WindowsNT/W2K server or domain.
CUPASS uses a flaw in the implementation of Microsofts
NetUserChangePassword API to guess/change the users password.
This release is the proof of concept code for the THC paper
"CUPASS and the NetUserChangePassword Problem"
THC-Dialup Login Hacker (UNIX)|
|Version: 1.1||Date: 2003-06-25||OS: Unix||Size: 14kb|
Long, long time ago, we released a tool called Login Hacker, for
penetrating dialup modems. Today we are releasing a similar and easier
tool for Linux which does the same job better. All you need is UNIX
and minicom. Have fun with this little release!
|Version: 1.5||Date: 2002-08-07||OS: Unix||Size: 4kb|
Flood Connect is a connection flooding tool which supports SSL,
sending + dumping data, closing or keeping sessions etc. Just a small
release. Have fun.
|Version: 0.0.8||Date: 2003-10-25||OS: Unix||Size: 197kb|
Project website: /thc-ffp|
This little tool generates fuzzy fingerprints as described in
the corresponding paper. It is an ideal extension to
man-in-the-middle attacks against the SSH service. The current
version supports RSA and DSA key generation and MD5 and SHA1
|Version: 1.0||Date: 1995-10-15||OS: DOS/DOSemu||Size: 55kb|
General Dialer is an oldschool blueboxing tool which
is able to use 5-frequency-trunks with volume ramp
and scale support for each frequency entry. Additional features
include: C4, C5, C6, f/b R2, DTMF dialing and a
a mini-scanner for PBX- and VMB-systems. The original
version has been released in 1995.
|Version: 1.5||Date: 1996-01-26||OS: DOS/DOSemu||Size: 31kb|
Small program to filter out
important accounts from
unix passwd files.
|Version: 0.3||Date: 2003-08-09||OS: Unix||Size: 14kb|
Grenzgaenger is a Socks-based tool for tunneling nmap, netcat and
exploits transparently through systems into protected networks. This
tool is in ALPHA state!
|Version: 0.9||Date: 1999-10-20||OS: Windows/Wine||Size: 278kb|
|Version: 7.4.2||Date: 2099-01-01||OS: Unix||Size: 651kb|
Project website: /thc-hydra|
THC-Hydra - the best parallized login hacker: for
Samba, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL,
VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support
and is part of Nessus. Visit the project web site to download
Win32, Palm and ARM binaries. Changes in 5.4: Several speed
improvements, bug fixes and a few enhancements! NOTE: We need
people to rewrite modules - please contact vh(at)thc(dot)org
|Version: 1.0||Date: 2002-03-11||OS: NT4/W2K||Size: 20kb|
IPF is the first command line tool for configuring the packet filter
of Windows NT4
and Window 2000 systems. It replaces the annoying GUI alternatives
be used as an elegant entry for writing advanced firewall scripts
under the Windows
THC-IPv6 Attack Toolkit|
|Version: 2.3||Date: 2099-01-01||OS: Unix||Size: 173kb|
Project website: /thc-ipv6|
THC is proud to be the first who are releasing an comprehensive
attack toolkit for the IPv6 protocol suite. It comprises of
state-of-the-art tools for alive scanning, man-in-the-middle
attacks, denial-of-service etc. which exploits inherent
vulnerabilities in IPv6. Included is a fast and easy to use
packet crafting library to create your own attack tools.
|Version: 1.0||Date: 2005-02-13||OS: Unix||Size: 10kb|
Keyfinder analyses files for public/private keys, encrypted or
compressed data. It identified such areas by measuring the
entropy, arithemtical mean and counter checking, and dumps
appropriate file sections.