|
[- about -] [- members -] [- projects -] [- contact -] [- hacking -] [- phreaking -] [- irc -] [- advisories -] |
Files from the Fallen Legions will be here soon.
| Newbie Information |
| 2600 Hack FAQ | The Original 2600 Quarterly FAQ on hacking |
| Guide to Mostly Harmless Hacking | A Comprehensive introduction to hacking without the criminal aspect. |
| IRC Hacking | The guide for taking over IRC |
| The Hackers Handbook | The most essential file for the Hacker |
| Webpage Hacking | A small collection of files geared towards webpage hacking |
| Source Code |
| ICQ Sniffer | Intercepts ICQ messages and passwords |
| IP Spoofer | Spoofs your true IP address |
| Cloak | Hides your presence from log files. |
| Datapipe | Allows you to create a datapipe to another computer |
| Grab Em | A program that collect passwords on Sun workstations |
| Advanced Hacking Files |
| DoD Computer Criteria | Dept. of Defence Orange Book |
| The Modern Hackers Desk Reference | Very good hacking reference file by the Rhino9 team |
| Unix Hacking Tutorial | Excellent UNIX hacking guide |
... the age of technology has brought down all boundaries and left few restrictions... |