List of Professional Hacking Tools Straight from the Realm of Hackers – Part 2


Anti-Virus Leak

The creator of this program, Alexei Bulazel, graduated from Rensselaer Polytechnic Institute of New York. He developed Anti-Virus Leak to allow security analysts to extract a number of files, MAC addresses and types of processes. Anti-Virus Leak – or AV Leak – also allows users to scan for fingerprints without the hassle of manually using binary reverse engineering.

AV Leak works with AVG Anti-Virus, Kaspersky, BitDefender, VBA32 and many more anti-virus softwares.


Image Source: Google Image – A still from YouTube showing Dradis in action.

Dardis, an open source program, was created by Daniel Martin. The software allows hackers to share their findings – such as flaws and vulnerabilities – with other security experts on a web-based interface that gives them a library of data. From this interface, they can keep track of what attacks and vulnerabilities they have discovered, and even informs them as to what steps can be taken for further results.


Image Source: Google Image – Vincent Tan from Vantage Point demonstrating his version of developed Swizzler at work at Black Hat 2016.

Swizzler was a framework long forgotten because of its instability, and its issues working with cell phones and platforms. Thanks to Vincent Tan, a senior security consultant at Vantage Point, Swizzler was taken under his wing and made better for mobile application assessment programs.


Image Source: Google Image – A screenshot showing Snoopy terminal working on Kali Linux.

Remember in Batman, when Bruce Wayne goes into Lex Luther’s server room and connects a device to download data from Lex’s the servers? Well, Snoopy is something similar, without the need to connect it. This program can be installed on RaspberryPi, or any other similar device, to collect information from people’s cellphones using their wireless signals (only Bluetooth and WiFi).

Since the software is not specific to the smartphone’s platform, it uses the protocol in both these wireless systems, giving it a vast data collecting technique.

It also allows users to create a profile of the target depending on the connected devices. The program has been studied by security specialists working at security consultancy, Sensepost. As this program does not limit the user’s imagination, it can be used as a rogue access point, allowing the hacker to collect traffic, as well as tap it.

Bluetooth Low Energy Man In The Middle Attacking Proxy

This software, made available on GATTack, is a tool that needs to be installed on RaspberryPi. With the right hardware, this tool can allow Bluetooth device exploitation.  It also allows users to spoof data such as false indications, and can intercept data for personal gain information from the device. It also has a feature that allows denial of service. However, one of its primary features is that it lets you take control of the device (if done under the right conditions). These are just a few amongst its other offers to reverse engineer and debug devices.

Source: Tools Watch, Black Hat

You want to support Anonymous Independent & Investigative News? Please, follow us on Twitter:

This article (List Of Professional Hacking Tools Straight From The Realm Of Hackers – Part 2) is a free and open source. You have permission to republish this article under a Creative Commons license with attribution to the author and


Get Your Anonymous T-Shirt / Sweatshirt / Hoodie / Tanktop, Smartphone or Tablet Cover or Mug In Our Spreadshirt Shop! Click Here



  1. Is there any way I can get into contact with a mentor of the sorts? I have seen the latest in Aleppo and have people over seas. Is there any way I can identify the ISIS attackers on twitter with a software or bot?


Please enter your comment!
Please enter your name here