Top 18 Apps Similar to InfoSec Reference (Donation)

How to Hack Wireless Networks 25
*** This app is designed for legal professionals, and isforeducational purposes only. The authors of this application donotcondone illegal activities or hacking where it is illegal. ***This app is a step by step tutorial on how to crack WEP andWPAnetworks to figure out the password.The full version contains:- Cracking WiFi networks secured with WEP and WPA/2- Acquiring Email account passwords through Man in theMiddleattacks(google, yahoo, hotmail)!- Intercept and hack Facebook accounts!- Bypassing school and work filters and firewallsonnetworks!- Hacking websites through various attack methods(SQLInjection,XSS, CSRF, RFI, LFI)!- How to acquire software/movies/games/music- Creating a hacking lab, so you can practice whatyou'velearned!- How to install Backtrack 5 R1 to USB/CD/DVD as a bootableliveoperating system!- Social Engineering How-To, Including a guide on theSocialEngineering Toolkit!+ MORECheck it out here:
Hackers Handbook 0.0.1
Briyt Apps
Hackers Companion Pro is a must have appforany hacking enthusiasts!This app connects you with like-minded individuals from all overtheworld, with hundreds of thousands of registered users.Step-by-step tutorials show you how to defend yourself fromhackers,perform penetration testing on your networks, computers,websites,cell phones, and more! Truly the ultimate handbook forany hacker.Pro features:- Ad free- No login required to view content- Exclusive membership pricingFeatures include:- A huge list of step by step guides and tutorials- Comment and discuss on all guides with the community- Forum provides a place for members to post questions anddiscusshacking related topics- VIP area for users who have purchased membershipincludesexclusive tutorials, tools, and discussionsTutorials on subjects such as:- Protecting yourself from other hackers.- Bypassing WEP, WPA, WPA2, and WPS wifi hotspots- How to use your phone to perform various hacks- Learning BackTrack 5 and Kali Linux- Testing websites for SQL injection vulnerabilities- How viruses, trojans, botnets, and keyloggers are createdanddetected- Staying Anonymous; how to keep you anonymous- Hacking Facebook accounts inside a LAN.- Website Hacking (Using SQLi)- FUD Virus using Hexxing.- Hack Remote PC using Backtrack/Kali Linux.- Get accounts for any website.+ much more!PRO users get a $5 discount on membership! Must be logged intopurchased.Purchasing VIP membership gets you access to:- Exclusive content that's available through the app or onourwebsite!- over 50% off discounts and coupons for otherrelatedproducts- Ad-free experience- Ability to send private messages to other HackersCompanionusers- First to receive the newest tutorials and content+ More coming soon!
Anonymous Hacks 1.2.2
V-Ware
Hack like Anonymous!This app was built with collaboration from Anonymousmembers!***THIS APP IS FOR EDUCATIONAL PURPOSES ONLY. USETHISINFORMATION AT YOUR OWN RISK***The first and best Anonymous hacking application on GooglePlay!Features:-The tutorials are pre-loaded. Internet is not needed.-Includes links to the hacking apps-Does not harvest personal information like other apps-Sleek, easy to use UI and tutorialsThis app explains how to:-Gain access to Facebook, Youtube, Twitter, Amazon,LinkedIn,eBay, etc. accounts-Carry out Denial-of-Service (DOS) Attacks whileremaininganonymous-Take-over of websites-Hacking best practices-Checking websites for SQL vulnerabilities and performingSQLInjection attacks-Capture and read network traffic-Flip/change images on a webpage for anyone on the network-Inject JavaScript into webpages-Redirect webpages on a network-Redirect YouTube videos to a rickroll-Remain anonymous on the Internet-Remain anonymous while performing hacks-Access the Deep Web (Silk Road, Black Market, Hacker Forums,otherhidden websites)-Hack into Windows computers-Information on the best Operating Systems to use to carryoutattacks and remain anonymous-Carrying out attacks using an Android phone-Much more...Follow us on Twitter: @v_ware_mobileDownload the most complete hacking app and start hackinglikeAnonymous!
C.I.A. Lock Picking Manual 1.0
Bob Ibanez
This is the official C.I.A. lockpickingmanual.The manual was given to all C.I.A. operatives.With this manual you learn how locks are designed.How to defeatthelock and the tools that aremost used.This manual is for reference only.
Hacking For Beginners - NEW 2.1
Manthan Desai
This Book Will Guide You Through The BasicAndAdvanced Steps of Hacking And Will Help You Develop TheHackerAttitude.You Will Learn Various Kinds Of Hacking IncludingWindowsHacking, Linux Installation & Use, Linux Hacking,VirusProgramming, Malware Programming, Trojan Programming,RootkitProgramming, Cross Site Scripting (XXS), Wireless Hacking(Wep, Wpa& Wpa2), Email Hacking, Mobile Hacking, Sniffing &PasswordCracking. This Book Promises You To Take You To High FieldsOfAdvanced Hacking & Cracking & Hence Make You One OftheBest Ethical Hackers Ever.Features:● Flipping Feature like virtual book.● One of the Best seller Kindle edition on amazon.com.● Best book for beginners to learn ethical hacking.● This book will definitely help newbies to learnethicalhacking.● Access Official blog of the Book in the same app withsingletap.● Any time support to your queries on the content of the book,wewill definitely help you regarding the difficulties you facetounderstand the basics.NEWS & SUPPORT:To get news and updates on Hacking For Beginners:- Blog: http://www.hackingtech.in- Twitter: http://twitter.com/hackingtech- Facebook: http://www.facebook.com/hackintech- Email: [email protected]
Web Hacking Course. 1.0
ddev
**Note :- Do not use knowledge provided inthisapp for destructive purpose Dolphindevlopers will not beresponsiblefor any damage caused by you to any site. So use yourknowledgeethically :-) **A android app that teaches the modern techniques of web hackingbydownloading this app you can learn following things :1) Xss.2) Rfi.3) Dnn Attacks.4) Lfi.5) Sql Injection.6) Blind Sql Injection.Keywords :- Xss.,Rfi,Dnn Attacks,Lfi,Sql Injection,BlindSqlInjection.
FactBook Ad-Free
Urbian
This is the ad-free version of thepopularFactBook reference app, offering fast + easy access to theCIAWorld Fact Book and United Nations data and statistics. Infoonmany topics (incl. geography, population, economy etc.),presentedclearly and beautifully.Now with fact sharing and definable reference country!
Hacking Awareness 1.2
Vikas Dahiya
★ Just give 1 hour your precious time tothisapp and after reading your hacking chance is negligible andfullknowledge of computer security.If your system or devices is vulnerable just a 10 minute isenoughto lose all your confidential information, data or privatefilesand get locked out of your system. This apps for all peopleand youhave to must read because security is primary concern forall ofus.What I am saying if you are not careful, aware what going onorprepare in advance you leave yourself in wide open range ofattack.If you are hacked then realized that I should prepare inadvanced,How and When this happened? Where did I do wrong? How muchit costto me?So it is better to get educated and read this app everysectioncarefully.If I tell you how you can be easily hacked? Then also told youthathow you protect yourself from these hacking attacks.These are topics that will be covered in this application:★ What information hacker access too ?★ Ethical hacking★ Which tricks they used ?★ What is phishing and social engineering ?★ Which phishing technique hacker used ?★ Different scams (how they deceive you ?)★ How to detect the phishing scam ?★ Why your account compromised ?★ Just in one look find out email is fake or not★ Tracing an Email★ How and why Facebook account hacked ?★ How to use Facebook in secured way ?★ If your Facebook account hacked what to do ?★ Hacking technique★ Detect your PC is secured or not ?★ How to make your Wi-Fi secured ?★ Different steps to make PC secured ?★ If you hacked what to do ?★ Security tips★ Complaint about different types of hacking★ The PC means here is Microsoft Window operating system.Do not believe me, read it yourself. You will be very amazedorsurprised.If you are only concerned about only Email security then youcandownload the Spot Fake Email apps.https://play.google.com/store/apps/details?id=anxious.spot.fake.email.info
CIA World Factbook 2011 17.1
MobileReference
The CIA World Factbook is areferenceresourceproduced by the Central Intelligence Agency of theUnitedStateswith almanac-style information about the countries oftheworld. Itprovides a summary of the demographics,geography,communications,government, economy, and military of themost of thecountries inthe world.
Hacking+ 2.1
Want to become a professional hacker ,thenThink like a Hacker..! Defend Like a Ninja..!If you don't know how to hack, you cannot defend yourselffromothers.If you want to learn ETHICAL HACKING and don't want to gowithexpensive ethical hacking course and then try out thisfreeapplication which teaches you everything for free.Hacking+ provides advanced Ethical Hacking tutorials and toolsonComputer Security, Network Security, Internet Security Program.Wealso guide users to get into Ethical Hacking World. We'llkeepupdating new tutorials and tools on regular basis.For Example : Footprinting, Phishing, DDOS, batch fileviruses,facebook password sniffing & wifi hacking (WEP,WPA),trojans,backdoors, worms, social engineering, RATs, TOR,proxy,Backtrack, android hacking tools, and much more!This app shows you the easiest, most direct ways tosafelyperform a given hack, how it works, and most importantly howtoprotect yourself against them.This app presents tried and tested, user friendly tutorialsforbeginners looking for a way into the hacking universe.[ FEATURES ] :* Free of Cost* Offline* Tried and Tested Tuts.* Constant updates******By confirming the Terms n Conditions*******The authors, developers and review analyzers will not beheldresponsible in the event any unlawful charges brought againstanyindividuals by misusing the information in this applicationtobreak the law. This application contains material andresourcesthat can be potentially destructive or dangerous. If youdo notfully comprehend something on this application, don‘t usethisapplication. Please refer to the laws and acts ofyourstate/region/ province/zone/territory or country beforeaccessing,using, or in any other way utilizing these resources.keywords : #hack, #hacking, #ethicalhacking, #attack
WhiteHat Hacking Tutorials 1.0.2
Whitebook is a growing community of WhiteHatHackers or so Called the Security Professionals, We Beginwithtutorials and Techniques to become a Security ProfessionalandLater Will Grow as a Community where with jobs updates,Projectupdates, Support and every thing related to Cyber Securityto ouruser.You can become a whitehat Hacker or Say a SecurityProfessionalby learning from our WhiteBook Tutorials, It ContainsfollowingTopics:1) Hacking Basics - Introduction to Hacking, Basic Concept ofIT,Concept of Security, Introduction to Networking, FootPrinting.2) Common Hacking Tuts - Google Hacking Database, windowsHackingand Security, Linux Hacking and Security, Virus, Worms andTrojans,DOS and DDOS, Sniffers, Network Hacking, SocialEngineering,Physical Security, Cryptography and Stenography, WI-FIhacking,FireWall and IDS/IPS.3) Vulnerabilities - Vulnerability Scanning,VulnerabilityResearch, Web Penetration Testing, Network PenetrationTesting,Server Penetration Testing and More Coming Soon,4) Security Standards ( Beta) - Security StandardsandPrinciples, OWSAP Top 10 Vulnerability, OSSTMM, SANS TOP25Vulnerabilities. ( Note: at Present We are Just Giving anOverviewin this module, We will be Soon Updating the Details)5) Exploits And Exploitation - Assembly Language,ExploitWriting, Buffer Overflow, Reverse Engineering,ExploitFrameworks6) BackTrack - Introduction to BackTrack, BackTrackMethodology,Information Gathering, Vulnerability Assessment,Exploitation UsingBT.7) Advance Tools - Acunetix, IBM App Scanner, Net Sparker,Vega,Burp Suite, W3AF, OWASP ZED Proxy, Aarachini, NMAP, Maltego,DarkComet, WireShark.8) Cyber Forensics - Hacking Incidents, Doing Forensics,DataRecovery and Analysis, Understanding Anti Forensics, CyberCrimeInvestigations ( Note: at Present We are Just Giving anOverview inthis Module, We will be Soon Updating the Details)9) Security Management - Information SecurityManagement,Policies and Documentations10) Tips and Tricks - Facebook hacking, Tips and Tricks,MobileTips and Tricks, List Sites You should not Scan.Security is a vast field and have several verticals, if youneedand other tutorials or have suggestions, We would love to hereit.We will Grow with the Best Tutorials and Content,We are also Looking for Enthusiast Professionals, who canJoinpart time to Contribute to this Growing Community.Content Creator and Mentor -Falgun Rathod - Managing Director at Cyber Octet Pvt. Ltd.andLeading Cyber Security ConsultantDisclaimers: The Information Provided on this Application istobe used for educational purpose only. TheWebsite/ApplicationCreator is in no way responsible for misuse ofthe informationprovided. All the Information in this WhitebookApplication ismeant to help the reader develop a ProfessionalSecurity Attitudein order to prevent the attacks Discussed. In noway should you usethe information to cause any kind of damagedirectly or indirectly.You Implement the information given at yourown Risk.
hacking sql injection 1.0
qoleyvision
SQL injection is a technique for exploitingwebapplications that use client-supplied data in SQL querieswithoutstripping potentially harmful characters first. Despitebeingremarkably simple to protect against, there is an astonishingnumberof production systems connected to the Internet that arevulnerableto this type of attack. The objective of this paper isto educatethe professional security community on the techniquesthat can beused to take advantage of a web application that isvulnerable toSQL injection, and to make clear the correctmechanisms that shouldbe put in place to protect against SQLinjection and inputvalidation problems in general.
Network Security Handbook 1.1
V-Ware
An advanced penetration testing app designed forsecurityprofessionals!
Military Intelligence 1.0
Military Intelligence, learn the enemy, opsec, enemyinformation,spies, cia
CIA - Cerita INJIL Audio 1.5
SABDA
GOSPEL is a good news story for Christians! Contains 350+picturewith audio.
C++ for hacker 1.0
qoleyvision
This tutorial is designed for everyone:Even if you've never programmed before or if you haveextensiveexperience programming in other languages and want toexpand intoC++! It is for everyone who wants the feeling ofaccomplishmentfrom a working program.
WinISCA 1.4
WinISCA is notes on the subjectInformationSystems Controls and Audit (ISCA) for students appearingin CAFinal examinations of The Institute of Chartered AccountantsofIndia. This first-ever and one-of-its-kind app with notes onamobile devise enables students to study anytime, anywhere.Thenotes are compiled by CA Nikunj Shah who has over ten yearsofexperience in teaching this subject.The notes are applicable to students for Nov. 2014examinationsand onwards and:1. Are In question-answer format,2. Are Intelligently indexed, with a drill-down facility, foreasynavigation,3. Enriched with over 50 diagrams / illustrations,4. Are in a language that is expected from students inexamand5. Cover past exams question up to Nov 13.An innovative and useful feature in the app is the “Test”sectioncaptioned “Kya Hai Jawab ISCA”. Answering MCQs in thissection shallenable students to effectively and efficiently reviewwhether theyhave precisely understood and are able to recollectwhat they havestudied.Also bundled are features where students make their ownnotings,save and then easily access them, highlight key words,choose frommultiple font types and sizes, day and night readingmodes, etc.all of which together promises to deliver to students aneverbefore, superior learning experience.DISCLAIMER: Although great care has been taken with thisproduct,neither the publisher nor the compiler is responsible forany errors/ mistakes that may have crept in. Your suggestions /comments arewelcome at [email protected]
Hack Hacker Hacking 1.2
Iggnovation
This App will give you greatknowledgeaboutHackHackerHacking