Thursday, January 21, 21:52
Home security The 5 most popular hacking tools used by hackers

The 5 most popular hacking tools used by hackers

Cyber ​​criminals use various hacking tools to attack the Internet based on the weaknesses of the target, to penetrate sensitive data. More and more often these tools are made available to the public and are mainly used by malicious users for various attacks around the world.



Today hacking tools are available in cyberspace and provide many different functions that can be used by anyone. These tools are also used to intercept information in a wide range of critical areas, such as health, finance, government defense and many other areas.

Every day, malware is trained in new techniques to find original ways to develop new sophisticated tools to avoid security systems.

Below are the top 5 hacking tools available to the public to use.

RAT - Trojan remote access: JBiFrost

Remote access enables cybercriminals who can perform various malicious activities. Especially the trojan JBiFrost Remote Access (RAT), which is one of the most powerful Adwind RATs and gives root access to the attacker.

It also contains many features and is used for installation backdoors and keyloggers, downloading screenshots and exporting data.

To avoid analyzing it, it disables security measures, such as Task Manager, and network analysis tools such as Wireshark, in the victim's system.


JBiFrost RAT is Java-based, cross-platform and multifunctional. It is a threat to many different operating systems, including Windows, Linux, MAC OS X and Android.

Based on older logs, it has managed to extract intellectual property, bank credentials and personal identifiers. Machines infected with JBiFrost can also be used as botnets to carry out Distributed Denial of Service (DDoS) attacks.

Theft of login credentials: Mimikatz

The main purpose of this tool is to collect the credentials of other users who are logged into a targeted PC with a Windows operating system.

Mimikatz gains access to credentials through a process of Windows called the "Local Security Subsystem Service". These credentials are in either plain text or hashed form and can be reused to provide access to other machines on a network.

The Mimikatz source code is publicly available and anyone can modify it and add new features.

Many features of Mimikatz can be automated using various scripts through PowerShell, allowing attackers to quickly exploit the vulnerabilities of a network.

Web shells: China Chopper

China Chopper is one of the most powerful hacking tools you'll find on the web, featuring a well-written web shell that is publicly available after a host has breached it.

Cybercriminals use it to download malware scripts on a host after a breach, so they can access a malicious remote.

The China Chopper web shell is widely used by malicious bodies to remotely access the hacked Internet servers, where document and registry management is provided, along with virtual terminal access to the hacked device.

One feature of China Chopper is that each action produces an HTTP POST action. This is easily detectable by many security programs.

Frameworks lateral movement: PowerShell Empire

PowerShell Empire helps attackers gain access after the initial breach.

Empire can also be used to create malicious scripts and executable files for access through social engineering in networks.

PowerShell Empire was designed as a legitimate penetration testing tool in 2015. It acts as a framework for continuous exploitation when an intruder has access to a system. Initial operating methods vary between violations, and malicious agents can configure the Empire framework individually for each scenario and target.

Empire allows an attacker to execute a series of actions on a victim's machine and provides PowerShell actions without the need to use 'powershell.exe' in the system. Its communications are encrypted and its architecture flexible.

Hide Tools: HTran

The hiding tools are very important and their use is to keep the identity of the intruders secret in order to avoid detection. There are some privacy tools, such as TOR, or other tools that can also hide their location.

“HUC (HTran) is a proxy tool used to redirect TCP connections from the local host to a remote host. This makes it possible for an intruder to hide communications. "

Many different cases have been observed in cyberspace where malicious agents use HTran and other connection proxy tools to:

  • avoid intrusion and detection systems on a network
  • be assimilated to regular traffic to bypass security checks
  • to undermine or conceal infrastructure or communications
  • create peer-to-peer or C2 networking infrastructures to avoid detection and provide stable connections


Please enter your comment!
Please enter your name here

In a world without fences and walls, who needs Gates and Windows


Mac: How to see which model you have and when it was released

When you need support for your Mac - or want to install some kind of upgrade - you usually need to know the exact ...

Bill Gates: Will he work with Biden on COVID-19 / climate change?

Microsoft co-founder Bill Gates said on Twitter that he is looking forward to working with the new US President, Joe Biden, and ...

What are the rumors circulating about the iPhone 13?

Apple iPhone 13 will have a redesigned Face ID system that will have a smaller notch at the top of the screen, ...

Biden: How was the political transition in the US captured on social media?

As Joe Biden was sworn in as President of the United States, this important political transition was captured on popular social media. On January 20, ...

CentOS ceases to be supported but RHEL is offered for free

Last month, Red Hat caused a great deal of concern in the Linux world when it announced the discontinuation of CentOS Linux.

Microsoft Office 365 employee passwords leaked online!

A new large-scale phishing campaign targeting global organizations has been found to bypass Microsoft Office 365 Advanced Threat Protection (ATP) and ...

COSMOTE and Microsoft provide new cloud solutions for businesses

COSMOTE and Microsoft expand their cooperation, offering even more advanced and high quality cloud solutions, in large and small ...

Cyber ​​attacks in Eastern Europe are on the rise!

The cyber-attacks that have taken place in many US government agencies and companies in recent months have caused concern in the developing countries of ...

Tesla reduces the prices of the Model 3 in Europe

Tesla has reduced the prices of the Model 3 in many European markets, which reductions could be partly linked ...

iOS, Android, XBox users in the crosshairs of a new malvertising campaign

Recently a new malvertising campaign was discovered that targets users of mobile and other connected devices and uses effective ...