These tools are for education purpose; DO NOT USE for other purposes (to harm and/or attack others etc.)
Please be aware of LEGAL issue
How to? = Computer Network Tools
Network I (Spring2017):
1)
Airdrop
, 2)
Video Call
, 3)
IoT Light Controller
, 4)
Wireless Network Penetration Test
, 5)
, 6)
The Dude
, 7)
Team Speak
, 8)
Snort
, 9)
, 10)
Chat Application using UDP
, 11)
Airplay
, 12)
Classroom Controller
, 13)
Desktop Viewer and Chat
, 14)
Advanced IP Scanner with Wakeup on LAN
, 15)
Docker
, 16)
Vistron SM
, 17)
Iron Fist 2 Player Game
, 18)
Raspberry PI Scanner
, 19)
Port Scanner
, 20)
Hamachi VPN
, 21)
Folder Locker
Network I (Spring2016):
1)
WiFi Camera
, 2)
OWASP
, 3)
Angry IP Scanner
, 4)
Advanced IP Scanner
, 5)
Connectify
, 6)
MS Remote Desktop
, 7)
Team Viewer
, 8)
Remote Mouse
, 9)
, 10)
Colasoft Capsa
, 11)
Radmin
, 12)
Chrome Remote Desktop
, 13)
SpiceWorks
, 14)
Bee Beep
, 15)
Net Balancer
, 16)
mHotspot
, 17)
Multiplicity
, 18)
Fiddler
, 19)
Acrylic WiFi
, 20)
NetCut
, 21)
Dirbuster
, 22)
Essential Nettools
, 23)
Axence Nvision
Computer Networks (Fall2016):
1)
Voice over IP using SIP Testbed
, 2)
Video Streaming Testbed
, 3)
DNS Zone Transfer Testbed
Computer Networks (Fall2015):
1)
colasoft_capsa
, 2)
cacti_linux
Computer Networks (Fall2014):
1)
nagios
, 2)
spicework
, 3)
xirrus
How to? = Computer Network Security Tools
Information and Communication Technology Security (Fall2016):
1)
Registration Bot
, 2)
ActivTrak
, 3)
Cain and Abel
, 4)
Mee Pern Virus
, 5)
DLC Windows Recovery Password
, 6)
Virus 123
, 7)
The Fat Rat (Android Trojan)
, 8)
DroidSQLi
, 9)
Spam Message in LINE
, 10)
Ransomeware
, 11)
Virus Builder (Batch File)
, 12)
Limit Speed
, 13)
Email Spammer
, 14)
Zip and RAR Password Unlock
, 15)
USB Stealer
, 16)
Charles Proxy
, 17)
Blue Botnet
, 18.1)
Virus Zika
, 18.2)
Havij SQL Injection
, 19)
Social Engineering Toolkit
, 20)
Nexpose and Metaspoit
Information and Communication Technology Security (Fall2015):
1)
inssider
, 2)
networkspoofer
, 3)
winlock
, 4)
ophcrack
, 5)
killBrontok
, 6)
softperfectnetworkscanner
, 7)
aircrack
, 8)
softperfect
, 9)
burp_suite
, 10)
jpasswordrecoverytool
, 11)
steganogaphy
, 12)
wirelesskeyview
, 13)
openstego
, 14)
nikto
, 15)
metasploit_hack_android
, 16)
lockify
, 17)
keepass
, 18)
subgraph_vega
, 19)
cain_and_abel
Information and Communication Technology Security (Fall2014):
1)
active_system_locker
, 2)
airrack_windows
, 3)
sam_spade
, 4)
beast
, 5)
hiren
, 6)
cybergate
, 7)
ophcrack
, 8)
ardamax
, 9)
alchemy
, 10)
interceptor_proxy
, 11)
ddos
, 12)
aircrack_kali
, 13)
netbus
, 14)
encrypt
, 15)
vlc_portable
, 16)
ettercap
, 17)
dirbuster
, 18)
cain_abel
How to? = Mobile and Wireless Networking Tools
Mobile and Wireless Technology (Spring2016):
1)
WiFi File Transfer
, 2)
IP Tools for Mobile Phone
, 3)
Lockout
, 4)
Open Signal Map
, 5)
WiFi Analyzer
, 6)
Ping Tools
, 7)
Cell Phone Coverage Map
Back to Chakchai So-In's Home Page