Search

Menu

Victim: View My Stats
You are here: Home Page » Equipment » Hacker Tools

Hacker Tools

Unshredder:

The Unshredder is something that helps a user “unshred” shredded documents. All a user has to do is just use the scanning technology with the device’s artificial intelligence, and that which was shredded will be made whole once again. A user must paste the torn strips of the document onto a transparent tray, and then scan both sides.

CSI Stick/SimCard Spy:

Allows the user to copy a sim card and all data for later recovery of message, even deleted ones.

Sneakey:

Uses tele-duplication, which is a way of extracting a normal key’s complete and precise “tooth pattern” at a distance using optical decoding and then cutting precise duplicates. In other words, a camera can take a picture of key from a distance, and from the high resolution photo, the photographer will have the information necessary to make a perfect copy of the photographed key.

^Back to Top

NetScan:

This program scans any KNOWN network (you must be connected to the network).It helps to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Adds +10 to Computer Use Skill when trying to determine what exploit to use on a protected computer system (Similar to Nmap).

ServerScan:

This program scans any KNOWN server (you must know the name of the server) for running services and protections. Adds +10 to Computer Use Skill when trying to determine what exploit to use on a protected computer system (Similar to MetaSploit).

PassCrack:

This program can crack any password at DC15 or less automatically. Adds +10 to Computer Use Skill when trying to crack the password on a protected computer system.

^Back to Top

DecryptIT:

This program can decrypt any encryption at DC15 (64-bit)or less automatically. Adds +10 to Computer Use Skill when trying to decrypt a protected computer system.

BounceIT:

This program can bounce your attack vector off know servers. Adding an additonal 15 to the opposing check to trace the attack. Adds +15 to Computer Use Skill when defending against a trace.

SpikeIT:

If you know you are being traced, it jams open the frame relay circuts, so that they will not disconnect, then sends a voltage surge into the tracing system. DC25 to disengage.

^Back to Top