Welcome to the THC release section. Below you will find the collection
of THC software applications. It includes sophisticated network
analysis and penetration test tools, cryptographic utilities
and a lot of other interesting stuff for the security
|Version: 7.4.2||Date: 2099-01-01||OS: Unix||Size: 651kb|
Project website: /thc-hydra|
THC-Hydra - the best parallized login hacker: for
Samba, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL,
VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support
and is part of Nessus. Visit the project web site to download
Win32, Palm and ARM binaries. Changes in 5.4: Several speed
improvements, bug fixes and a few enhancements! NOTE: We need
people to rewrite modules - please contact vh(at)thc(dot)org
|Version: 1.91||Date: 2001-03-30||OS: DOS/DOSemu||Size: 55kb|
World´s best Credit Card
Generator, checks and
generates over hundreds of
different card types including
bank ids and
standards. For all you horny
who always wanted an
account at Amateurs or
Dirtybird, NOW supporting
magnetic card reader and
|Version: 2.01||Date: 2005-10-01||OS: DOS/DOSemu||Size: 528kb|
For the 10th anniversary of THC
here is a special update for
THC-Scan: Recompiled to run on
modern computers without problems.
A new version of world´s
best free wardialer/scanner.
THC-Scan v2.01 is working
under DOS, Win95/98/NT/2K/XP and
all DOS emulators (UNiX) on
all 80x86 processors. ODBC
databank support, completely
automated tone, carrier, vmb
scanning, large palette of
analysing tools included.
Comes with full source code.
THC-IPv6 Attack Toolkit|
|Version: 2.3||Date: 2099-01-01||OS: Unix||Size: 173kb|
Project website: /thc-ipv6|
THC is proud to be the first who are releasing an comprehensive
attack toolkit for the IPv6 protocol suite. It comprises of
state-of-the-art tools for alive scanning, man-in-the-middle
attacks, denial-of-service etc. which exploits inherent
vulnerabilities in IPv6. Included is a fast and easy to use
packet crafting library to create your own attack tools.
|Version: 5.4||Date: 2011-06-01||OS: Unix||Size: 257kb|
Project website: /thc-amap|
*THC 10th anniversary special release*
Amap is a next-generation scanning tool, which identifies
applications and services even if they are not listening on the
default port by creating a bogus-communication and analyzing
the responses. Changes: many more fingerprints, fix for SSL.
Voted into the top-50 security tool list!
|Version: 2.3||Date: 2001-10-27||OS: Linux||Size: 27kb|
THC-WarDrive is a tool for
mapping your city for wavelan
networks with a GPS device
while you are driving a car
or walking through the streets.
It is effective and flexible,
a "must-download" for all
|Version: 3.1||Date: 2003-11-15||OS: Unix||Size: 61kb|
This is the best secure data deletion toolkit!
If you overwrite a file for 10+ times, it can still be
recovered. Read why and use the programs included (w/src!).
These tools can wipe files, free disk space, swap and memory!
Changes: Linux LKM for secure file deletion included, small bufixes.
|Version: 1.0||Date: 2000-01-31||OS: DOS/DOSemu||Size: 25kb|
THC-PassID is a small application that
will generate serial numbers for german
passports (identity cards). Also included
is a small article how to calculate such
serial numbers. This tool and article proves
that xxx-site shouldn't rely on serial numbers
for age verification.
|Version: 2.1.1||Date: 2003-12-19||OS: Linux||Size: 27kb|
THC-vlogger, an advanced linux kernel based keylogger, enables the
capability to log keystrokes of all administrator/user's sessions via
console, serial and remote sessions (telnet, ssh), switching logging
mode by using magic password, stealthily sending logged data to
centralized remote server. Its smart mode can automatically detect
password prompts to log only sensitive user and password information.
|Version: 0.1||Date: 2004-02-10||OS: Unix||Size: 170kb|
The THC LEAP Cracker Tool suite contains tools to break the
NTChallengeResponse encryption technique e.g. used by Cisco Wireless
Also tools for spoofing challenge-packets from Access Points are
included, so you are able to perform dictionary attacks against all
|Version: 1.2.5||Date: 2003-05-30||OS: Unix||Size: 652kb|
Project website: /thc-rut|
THC-RUT (aRe yoU There, pronouced as root) is your first knife on
foreign network. It gathers informations from local and remote
It offers a wide range of network discovery tools: arp lookup on an
IP range, spoofed DHCP request, RARP, BOOTP, ICMP-ping, ICMP address
mask request, OS fingerprintings, high-speed host discovery, ...
The tool is capable of discovering a Class B network within 10
|Version: 1.2||Date: 2002-07-11||OS: Unix||Size: 56kb|
THC-Parasite v1.2 allows you to sniff on switched networks by
performing ARP man-in-the-middle spoofing. Selective targets, DOS and
various other features present. Changes: Now running on Solaris and
OpenBSD as well! :-)
|Version: 1.0||Date: 2001-09-11||OS: Windows NT/2000||Size: 34kb|
CUPASS uses techniques to guess the password of ANY user
on a WindowsNT/W2K server or domain.
CUPASS uses a flaw in the implementation of Microsofts
NetUserChangePassword API to guess/change the users password.
This release is the proof of concept code for the THC paper
"CUPASS and the NetUserChangePassword Problem"
|Version: 0.9||Date: 1999-10-20||OS: Windows/Wine||Size: 278kb|
|Version: 1.1||Date: 1996-04-14||OS: DOS/DOSemu||Size: 147kb|
Powerfull script language to
terminal logins via
Configurable for telnet and
hacking, extreme large
|Version: 0.1.4||Date: 2005-01-05||OS: Unix||Size: 63kb|
Brute force program against pptp vpn endpoints (tcp port 1723).
Fully standalone. Supports latest MSChapV2 authentication.
Tested against Windows and Cisco gateways. Exploits a weakness
in Microsoft's anti-brute force implementation which makes it
possible to try 300 passwords the second.