- Best Linux Os For Hacking
- Hacking Tool For Mac Os X
- Download Tools For Mac
- Hack App Mac Os
- Hacking Tools For Windows
- Hack App Store Mac Os X
Learn how to attack wireless networks
How to Use The Mac OS X Hackers Toolbox When you think of an operating system to run pen testing tools on, you probably think of Linux and more specifically BackTrack Linux. BackTrack Linux is a great option and one of the most common platforms for running pen testing tools. In today’s present world, android is the best as well as a quick emerging operating system. The amazing features of android and iPhone are increasing, so a plenty of android hacking tool is being launched. So, many people are using the android and iOS hacking apps for safety purposes. How to Use The Mac OS X Hackers Toolbox When you think of an operating system to run pen testing tools on, you probably think of Linux and more specifically BackTrack Linux. BackTrack Linux is a great option and one of the most common platforms for running pen testing tools.
Learn about exploiting wireless networks, including protocols, Wi-Fi authentication and weak points.
This skills course also covers
This skills course also covers
⇒ Tools and techniques used to break into passwords
⇒ Attacking wireless networks
⇒ And more
⇒ Attacking wireless networks
⇒ And more
Start your free trial
Last year, I wrote an article covering popular wireless hacking tools to crack or recover password of wireless network. We added 13 tools in that article which were popular and work great. Now I am updating that post to add few more in that list.
I will not explain about wireless security and WPA/WEP. You can read the existing article on wireless hacking tools to learn about them. In this post, I am updating the existing list to add few more powerful tools. I am adding seven new tools in the existing list to give you a single list of the most used wireless cracking tools.
1. Aircrack
Aircrack is the most popular and widely-known wireless password cracking tool. It is used as 802.11 WEP and WPA-PSK keys cracking tool around the globe. It first captures packets of the network and then try to recover password of the network by analyzing packets. It also implements standard FMS attacks with some optimizations to recover or crack password of the network. optimizations include KoreK attacks and PTW attack to make the attack much faster than other WEP password cracking tools. This tool is powerful and used most widely across the world. This is the reason I am adding it at the top of the list.
It offers console interface. If you find this tool hard to use, you can try the available online tutorials. Company behind this tool also offers online tutorial to let you learn by yourself.
Download: http://www.aircrack-ng.org/
2. AirSnort
AirSnort is another popular wireless LAN password cracking tool. It can crack WEP keys of Wi-Fi802.11b network. This tool basically operates by passively monitoring transmissions and then computing the encryption key when enough packets have been gathered. This tool is freely available for Linux and Windows platform. It is also simple to use. The tool has not been updated for around three years, but it seems that company behind this tool is now interested in further development. This tool is also directly involved in WEP cracking and hence used widely.
Download AirSnort: http://sourceforge.net/projects/airsnort/
3. Kismet
Kismet is another Wi-Fi 802.11 a/b/g/n layer 2 wireless network sniffer and intrusion detection system. This tool is basically used in Wi-Fi troubleshooting. It works fine with any Wi-Fi card supporting rfmon mode. It is available for Windows, Linux, OS X and BSD platforms. This tool passively collects packets to identify standard network and also detects the hidden networks. Built on a client server modular architecture, this tool can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. It is an open source tool and supports recent faster wireless standards.
Download Kismet: http://www.kismetwireless.net/download.shtml
4. Cain & Able
Cain & Able is another popular tool used for cracking wireless network passwords. This tool was developed to intercept the network traffic and then use the brute forcing to discover the passwords. This is why this tool helps a lot while finding the password of wireless network by analyzing the routing protocols. This tool can also be used to crack other kind of passwords. It is one of the most popular password cracking tools.
This tool is not just for WEP cracking but various other features are also there. It is basically used for Windows password cracking. This is the reason this tool is so popular among users.
Download Cain & Able: http://www.oxid.it/cain.html
5. WireShark
WireShark is a very popular tool in networking. It is the network protocol analyzer tool which lets you check different things in your office or home network. You can live capture packets and analyze packets to find various things related to network by checking the data at the micro-level. This tool is available for Windows, Linux, OS X, Solaris, FreeBSD and other platforms.
If you are thinking to try this tool, I recommend you to first read about networking and protocols. WireShark requires good knowledge of network protocols to analyze the data obtained with the tool. If you do not have good knowledge of that, you may not find this tool interesting. So, try only if you are sure about your protocol knowledge.
Wireshark does is one of the most popular tool in networking and this is why it was included in this list in higher position.
Download Wireshark: https://www.wireshark.org/
6. Fern WiFi Wireless Cracker
Fern WiFi Wireless Cracker is another nice tool which helps with network security. It lets you see real-time network traffic and identify hosts. Basically this tool was developed to find flaws in computer networks and fixes the detected flaws. It is available for Apple, Windows and Linux platforms.
it is able to crack and recover WEP/WPA/WPS keys easily. It can also run other network based attacks on wireless or Ethernet based networks. For cracking WPA/WPA2, it uses WPS based on dictionary based attacks. For WEP cracking, it uses Fragmentation, Chop-Chop, Caffe-Latte, Hirte, ARP Request Replay or WPS attack.
This tool is in active development. SO, you can expect timely update with new features. Pro version of the tool is also available which offers much features.
Download Fern WiFi Wireless cracker: http://www.fern-pro.com/downloads.php
7. CoWPAtty
CoWPAtty is another nice wireless password cracking tool. It is an automated dictionary attack tool for WPA-PSK to crack the passwords. It runs on Linux OS and offers a less interesting command line interface to work with. It runs on a word-list containing thousands of password to use in the attack. If the password is in the password’s word-list, this tool will surely crack the password. But this tool is slow and speed depends on the word list and password’s strength. Another reason for slow process is that the hash uses SHA1 with a seed of SSID. It means the same password will have a different SSIM. So, you cannot simply use the rainbow table against all access points. So, the tool uses the password dictionary and generates the hash for each word contained in the dictionary by using the SSID. This tool is simple to use with available commands.
With the newer version of the tool CoWPAtty tried to improve the speed by using a pre-computed hash file to avoid the computation at the time of cracking. This pre-computed file contains around 172000 dictionary file for around 1000 most popular SSIDs. But for successful attack, your SSID must be in that list. If your SSID is not in those 1000, you are unlucky. Still, you can try this tool to see how it works.
Download CoWPAtty: http://sourceforge.net/projects/cowpatty/
8. Airjack
Airjack is a Wi-Fi 802.11 packet injection tool. It is used to perform DOS attack and MIM attack. This wireless cracking tool is very useful in injecting forged packets and making a network down by denial of service attack. This tool can also be used for a man in the middle attack in the network. This tool is popular and powerful both.
Download AirJack: http://sourceforge.net/projects/airjack/
9. WepAttack
WepAttack is another working open source Linux tool for breaking 802.11 WEP keys. Like few other tools in the list, this tool also performs an active dictionary attack. It tests millions of words from its dictionary to find the working key for the network. Only a working WLAN card is required to work with WepAttack to perform the attack. Limited usability but works awesome on supported WLAN cards.
Download WepAttack: http://wepattack.sourceforge.net/
10. NetStumbler
NetStumbler is another wireless password cracking tool available only for Windows platform. It helps in finding open wireless access points. This tool is freely available. Basically NetStumbler is used for wardriving, verifying network configurations, finding locations with a poor network, detecting unauthorized access points, and more.
This tool is not very effective now. Main reason is that last stable release of the tool was back in April 2004 around 11 years ago. So, it does not work with 64-bit Windows OS. It can also be easily detected with most of the wireless intrusion detection systems available. So, you can use this tool for learning purpose on home network to see how it works.
A trimmed down version dubbed as ‘MiniStumbler’ of the tool is also available. This tool is too old but it still works fine on supported systems. So, I included it in this list.
Download NetStumbler: http://www.stumbler.net/
Learn how to attack wireless networks
Learn about exploiting wireless networks, including protocols, Wi-Fi authentication and weak points.
This skills course also covers
This skills course also covers
⇒ Tools and techniques used to break into passwords
⇒ Attacking wireless networks
⇒ And more
⇒ Attacking wireless networks
⇒ And more
Start your free trial
11. inSSIDer
inSSIDer is one of the most popular Wi-Fi scanner for Microsoft Windows and OS X platforms. This tool was released under open source license and also awarded as “Best Open Source Software in Networking”. Later it became premium tool and now costs $19.99. The inSSIDer Wi-Fi scanner can do various tasks, including finding open Wi-Fi access points, tracking signal strength, and saving logs with GPS records. Basically this tool is used by network administrators to find the issues in the wireless networks
Download inSSIDer: http://www.inssider.com/
12. Wifiphisher
Wifiphisher is another nice hacking tool to get password of a wireless network. This tool can execute fast automated phishing attack against a Wi-Fi wireless network to steal passwords. This tool comes pre-installed on Kali Linux. It is free to use and is available for Windows, MAC and Linux.
Download and read more about WiFiphisher:
https://github.com/sophron/wifiphisher
https://github.com/sophron/wifiphisher
13. KisMac
KisMac is tool very much similar to Kismet, we added in the list above. It offers features similar to Kismet and is used as wireless network discovery hacking tool. As the name suggests, this tool is only available for Mac. It scans for networks passively only on supported wireless cards and then try to crack WEP and WPA keys by using brute force or exploiting any flaw.
Download KisMac:
http://kismac-ng.org/
http://kismac-ng.org/
14. Reaver
Reaver is an open-source tool for performing brute force attack against WPS to recover WPA/WPA2 pass keys. This tool is hosted on Google Code and may disappear soon if developer has not migrated it to another platform. It was last updated around 4 years ago. Similar to other tools, this tool can be a good alternate to other tools in the list which use same attack method.
Download Reaver:
https://code.google.com/p/reaver-wps/downloads/list
https://code.google.com/p/reaver-wps/downloads/list
15. Wifite
Wifite is also a nice tool which supports cracking WPS encrypted networks via reaver. It works on Linux based operating systems. It offers various nice features related to password cracking.
Download Wifite: https://github.com/derv82/wifite
We have a complete article on Wifite. Read wifite walkthrough.
16. WepDecrypt
WepDecrypt is another wireless LAN tool written in C language. This tool can guess the WEP keys by performing dictionary attack, distributed network attack, key generator and some other methods. This tool needs few libraries to work. You can read more details on the download page. Tool is not so popular but it is good for beginners to see how dictionary attack works.
Download and read more about WepDecrypt:
http://wepdecrypt.sourceforge.net/wepdecrypt-manual.html
http://wepdecrypt.sourceforge.net/wepdecrypt-manual.html
17. OmniPeek
OmniPeek is a packet sniffer and network packets analyzer tool. This tool is only available for Windows platform and is available for commercial use only. It also requires you to have good knowledge of network protocols and understanding of network packets. It works with most of the network interface cards available in market. With available plugins, this tool can become more powerful. Around 40 plugins are already available to extend the functions of this tool.
Download OmniPeek: http://www.wildpackets.com/products/distributed_network_analysis/omnipeek_network_analyzer
18. CloudCracker
CloudCracker is an online password cracking tool to crack WPA keys of Wireless network. This tool can also be used to crack various other kind of password hashes. You only need to upload the handshake file and enter the network name to start the attack. With 3000 million words long dictionary, this tool is most likely to crack the password. This tool is also used for MD5, SHA and few other cracking. It is also an effective tool and worth to mention if we talk about wireless cracking tools.
See CloudCracker: https://crack.sh/
19. CommonView for Wi-Fi
CommonView for Wi-Fi is also a popular wireless network monitor and packer analyzer tool. It comes with easy to understand and use GUI to work with. This tool is basically for Wi-Fi network admins and security professionals who want to monitor and troubleshoot network related problems. It works fine with Wi-Fi 802.11 a/b/g/n/ac networks. It captures every single packet and lets you see useful information of the network. You can also get useful information like protocol distribution, access points, signal strength and more. This tool offers key information about a network and has a good value for network admins.
Download CommonView: http://www.tamos.com/products/commwifi/
20. Pyrit
Pyrit is also a very good tool which lets you perform attack on IEEE 802.11 WPA/WPA2-PSK authentication. This tool is available for free and is hosted on Google Code. SO, it could be disappearing in coming months. It works on range of platforms including FreeBSD, MacOS X and Linux.
It performs brute-force attack to crack the WPA/WPA-2 passwords. It is very effective and I recommend you to try it once. Due to its effectiveness, it was necessary to mention this tool in this list.
Download Pyrit:
https://code.google.com/p/pyrit/
https://code.google.com/p/pyrit/
Ethical Hacking Training
Learn how to attack wireless networks
Learn about exploiting wireless networks, including protocols, Wi-Fi authentication and weak points.
This skills course also covers
This skills course also covers
⇒ Tools and techniques used to break into passwords
⇒ Attacking wireless networks
⇒ And more
⇒ Attacking wireless networks
⇒ And more
Start your free trial
Final words
In this post, I added twenty working wireless cracking tools available for free or in open source licenses. You can try these tools to get access to a wireless network without knowing its password. Most of the tools are capable of cracking wireless network passwords but password cracking time may vary depending on the password’s complexity and length. Few tools cannot be directly used in cracking wireless passwords but packet analysis helps in guessing password.
I also recommend the use of these tools just for learning purpose. We do not encourage illegal activities and do not support these kind of people. Hacking wireless network to get unauthorized access is a cyber-crime. So, do not put yourself into a risk.
If you are into network security profession, you must know about these tools.
I tried my best to provide most of the available popular wireless hacking tools. If you have any suggestion, you can comment below to suggest us.
© Amit Singh. All Rights Reserved.Written in December 2003Mac OS X Hacking Tools
Hacking? Tool?
The Jargon File is a popular lexicographic resource amongst hackers (and non-hackers too). Although it might have some subjective definitions I may not agree with, I have conveniently quoted verbatim the definitions of the terms 'hacker' and 'tool' as a preface to the contents of this page.
hacker [originally, someone who makes furniture with an axe]
1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. RFC1392, the Internet Users' Glossary, usefully amplifies this as: A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.
more>>>
tool 1. n.A program used primarily to create, manipulate, modify, or analyze other programs, such as a compiler or an editor or a cross-referencing program. Oppose app, operating system; see also toolchain.
more>>>
So?
It is eminently debatable whether one (that means me, you or whosoever else) is a 'hacker', but such a debate would probably be fruitless anyway, even meaningless. I do enjoy exploring the details of all sorts of things, including operating systems. This page is a compendium of some programs you might come across while tinkering with Mac OS X. Documentation for most of these tools exists, therefore my aim is not to reproduce documentation, but simply to maintain a cache of relevant information. I believe this would be useful to those who are new to Mac OS X, but are interested in exploring the system at a low(er) level. Note that many of the tools listed here are ones that are either new to Mac OS X (as compared to Unix style systems), or are different from their Unix counterparts. In other words, I have avoided listing 'standard' Unix/BSD tools. Moreover, do realize that some (like
dynamic_pager
and various daemons) are not really tools.The following list has not been fully updated for Panther (10.3.x).
Tools
KernelEventAgent
/usr/sbin/KernelEventAgent
handles one of the core system services (events such as file systems being mounted and unmounted, low disk space, network connections going down, etc.)SystemStarter
/sbin/SystemStarter
is run during system initialization to handle 'startup items'. See 'Mac OS X System Startup' for details.aexml
/usr/sbin/aexml
forwards XMLRPC and SOAP requests to the AppleEvent manager for further dispatching. More documentation is available on the Apple Developer Web Site.appleping
/usr/bin/appleping
exercises the AppleTalk network by sending packets to a named host.ardbgd
/usr/sbin/ardbgd
is the daemon for the Apple Remote Debugging Service.asr
/usr/sbin/asr
(Apple Software Restore) efficiently copies disk images and volumes, and can also accurately clone volumes.bless
/usr/sbin/bless
is used to set volume bootability characteristics for Macintoshes. The command can be used to select a folder on a mounted volume to act as the blessed system folder, and optionally update Open Firmware to boot from that volume. It can also be used to format and setup a volume for the first time. Finally, it can be used to query the folder(s) that are blessed on a volume. Try the following (non-destructive) commands: % sudo bless -verbose -info / ... % sudo bless -verbose -plist -info /
blued
/usr/sbin/blued
is the Bluetooth daemon.cac_*
/usr/sbin/cac_*
are scripts related to CAC (Common Access Card) support. A CAC can be thought of as a SmartCard that combines multiple cards (functions) into one. A CAC can enable physical access to buildings and controlled places, enable computer network and system access and serve as the primary platform for the PKI token.cmpdylib
/usr/bin/cmpdylib
compares two dynamic shared libraries for compatibility.![For For](/uploads/1/2/6/8/126879412/713656849.png)
createhomedir
/usr/sbin/createhomedir
creates and populates local home directories.ddb
ddb
is a debugging mechanism that can be compiled into Mac OS X, similar to BSD's kdb
. While gdb
can be used over Ethernet (through a kernel stub), ddb
is compiled into the kernel and is used over a serial line. Most importantly, ddb
requires an actual built-in hardware serial line on the debug target. Fortunately, gdb
should suffice for almost all debugging needs unless one is trying to debug an Ethernet driver itself, say.ddb
is not present by default on Mac OS X. It must be compiled from source (xnu/osfmk/ddb
in the CVS tree).defaults
/usr/bin/defaults
is used to access (read, write and delete) Mac OS X user defaults from the command line. For example, the following will print out Desktop background settings (including the pathname for the desktop background image, if any): % defaults read com.apple.desktop Background
dev_mkdb
/usr/sbin/dev_mkdb
creates a hash access method database (based on Berkeley DB) in /var/run/dev.db
. This database contains the name of all devices under /dev
.diskarbitrationd
/usr/sbin/diskarbitrationd
is a daemon that listens for connections from clients, notifies clients of the appearance of disks and filesystems, and governs the mounting of filesystems and claiming of disks amongst clients.disktool
/usr/sbin/disktool
is a command line utility for disk arbitration. It can be used to rename, eject, mount or unmount disks and volumes.diskutil
/usr/sbin/diskutil
is a utility for managing disks and volumes. It can be used to perform operations such as enabling/disabling HFS+ journaling, verifying and repairing permissions, erasing disks (including optical media), partitioning, creating and managing RAID sets etc. You typically need root access to use this utility.ditto
/usr/bin/ditto
copies files and directories to a destination directory. ditto
can be used to 'thin' 'fat' (multiple-architecture) exectuables. It can also copy files selectively based on the contents of a BOM ('Bill of Materials'). One of the most useful features of ditto
is that it can preserve resource fork and HFS meta-data information when copying files.drutil
/usr/bin/drutil
is a command line tool that uses the DiscRecording framework to interact with attached CD/DVD burning devices.dscl
/usr/bin/dscl
is the Directory Service command line utility.dsperfmonitor
/usr/bin/dsperfmonitor
is a directory tool for testing plugin performance in Directory Services.dynamic_pager
/sbin/dynamic_pager
is started during system initialization to manage swap files. See Mac OS X System Startup for details.fdisk
/usr/sbin/fdisk
displays or changes the DOS partition table found in the bootsector of x86 bootable disks.fixPrecomp
/usr/bin/fixPrecomp
is a tool for 'fixing' precompiled header warnings that occur when headers get out-of-sync with their precompiled versions - after a system update, say.fixproc
/usr/bin/fixproc
is a Perl script that 'fixes' a named process by performing the specified action (which can be check, kill, restart, exist or fix).fs_usage
/usr/bin/fs_usage
presents an ongoing display of system call usage information pertaining to file system activity. By default this includes all system processes except the running fs_usage
process, Terminal
, telnetd
, sshd
, rlogind
, tcsh
, csh
and sh
.fstat
/usr/bin/fstat
identifies open files (including sockets).heap
/usr/bin/heap
lists all the malloc-allocated buffers in the specified process's heap.hdiutil
/usr/bin/hdiutil
uses the DiskImages
framework to manipulate disk image files.hlfsd
/usr/sbin/hlfsd
is the home-link file system daemon. It implements a file system containing a symbolic link to a subdirectory within a user's home directory, depending on the user which accessed that link.installer
/usr/sbin/installer
is the Mac OS X system software and package installer tool.install_name_tool
/usr/bin/install_name_tool
changes the dynamic shared library install names recorded in a Mach-O binary. ioalloccount
/usr/sbin/ioalloccount
displays some accounting of memory allocated by IOKit
allocators, including object instances, in the kernel. This is useful for tracking memory leaks.ioclasscount
/usr/sbin/ioclasscount
displays the instance count, offset by the number of direct subclasses that have at least one instance allocated, for the classes specified. This is useful for tracking leaks.ioreg
/usr/sbin/ioreg
displays the IOKit
registry. Try ioreg -l
, for example, and you can see detailed registry information (including object properties) - such as details of various temperature sensors in the system (on the I2C bus).iostat
/usr/sbin/iostat
displays kernel I/O statistics on terminal, disk and cpu operations.ipconfig
/usr/sbin/ipconfig
can be used to get the number of network interfaces active (the ifcount
argument), and also to retrieve various options associated with these interfaces. For example, 'ipconfig getoption en1 lease_time
' prints the DHCP lease time of en1
if applicable. Finally, ipconfig
can also be used to set an interface for BOOTP
, DHCP
etc.kdump
/usr/bin/kdump
displays the kernel trace files produced with ktrace
in human readable format.kextcache
/usr/sbin/kextcache
creates or updates kext
caches, which are used to speed up kernel extension loading operations and to prepare kexts
for inclusion in such media as device ROM.kextload
/sbin/kextload
can be used to explicitly load kernel extensions, validate them to see that they can be loaded by other mechanisms, such as kextd
, and to generate symbol files for debugging the kext
in a running kernel.kextstat
/usr/sbin/kextstat
displays the status of any kernel extensions currently loaded in the kernel.kextunload
/sbin/kextunload
is used to terminate and unregister IOKit
objects associated with a kernel extension and to unload the code and personalities for that kext
.kgmon
/usr/sbin/kgmon
generates a dump of the operating system's profile buffers for later analysis by gprof
.ktrace
/usr/bin/ktrace
enables kernel trace logging for the specified processes, causing trace data to be logged to a file. Traced kernel operations include system calls, namei translations, signal processing and I/O.latency
/usr/bin/latency
is used for monitoring scheduling and interrupt latency. The tool can also be used to set real time or timeshare scheduling policies.ld
/usr/bin/ld
is the (Mach) object file link editor.leaks
/usr/bin/leaks
examines a specified process for malloc-allocated buffers which are not referenced by the program.lipo
/usr/bin/lipo
creates or operates on multi-architecture ('fat') files. It can list the architecture types in a fat file, create a single fat file from one or more input files, thin out a single fat file to a specified architecture type, and extract, replace and/or remove architecture types from the input file.lockfile
/usr/bin/lockfile
can be used to create one or more (conditional) semaphore files, with the provision of waiting for a specified number of seconds and a specified number of retries.lsbom
/usr/bin/lsbom
interprets the contents of binary bom
(bill-of-materials) files. bom
is a file system used by the Mac OS X installer to determine which files to install, remove, or upgrade.lsof
/usr/sbin/lsof
lists information about files opened by processes.lsvfs
/usr/bin/lsvfs
lists known (currently loaded) virtual file systems.mDNSResponder
/usr/sbin/mDNSResponder
(Multicast DNS Responder) listens for and responds to DNS-format query packets sent via Multicast to UDP port 5353.mach_init
/sbin/mach_init
is a daemon that maintains various mappings between service names and the Mach ports that provide access to those services.malloc_history
/usr/bin/malloc_history
inspects a given process and lists the malloc allocations performed by it. It relies on information provided by the standard malloc library when debugging options have been turned on.mig
/usr/bin/mig
(Mach Interface Generator) is used to compile procedural interfaces to Mach's message-based APIs, based on descriptions of those APIs.Best Linux Os For Hacking
mkbom
/usr/bin/mkbom
creates a bom
(bill-of-materials) given a directory.mkextunpack
/usr/sbin/mkextunpack
extracts the contents of a multikext (mkext) archive.netstat
/usr/sbin/netstat
symbolically displays the contents of various network-related data structures.nibindd
/usr/sbin/nibindd
is a daemon that is responsible for finding, creating and destroying NetInfo
servers.nibtool
/usr/bin/nibtool
is used for printing, verifying and updating nib
files.nicl
/usr/bin/nicl
is a general-purpose utility for operating on NetInfo
databases. Its commands allow one to create, read and manage NetInfo
data.nidomain
/usr/sbin/nidomain
is an interface to nibindd
to which it sends all of its requests about the domains served on a given machine. It can also be used to create and destroy NetInfo
databases.nifind
/usr/bin/nifind
finds a directory in the NetInfo
hierarchy.nigrep
/usr/bin/nigrep
searches for a regular expression in the NetInfo
hierarchy.niload
/usr/bin/niload
loads information from standard input into the given NetInfo
domain.nireport
/usr/bin/nireport
prints tables from the NetInfo
hierarchy.niutil
/usr/bin/niutil
is used to do arbitrary reads and writes on the given NetInfo
domain.nmedit
/usr/bin/nmedit
is used to change global symbols to local symbols. It differs from strip
in that it also changes the symbolic debugging information for the global symbols it changes to static symbols so that the resulting object can still be used with a debugger.notifyd
/usr/sbin/notifyd
is a daemon that facilitates processes to exchange stateless notification events.nvram
/usr/sbin/nvram
allows manipulation of Open Firmware non-volatile RAM variables.objcopy
objcopy
is part of binutils
that you can download, compile and install. This utility copies the contents of an object file to another, using the GNU BFD (Binary File Descriptor) library to access the object files. objdump
objdump
is part of binutils
. It displays information (including disassembly, if required) about one or more object files.open
/usr/bin/open
is a command line utility to open a file (or a directory or URL), just as if you had double-clicked the file's icon.open-x11
/usr/bin/open-x11
is a wrapper shell script that provides open
functionality for X11 applications.orbd
/usr/bin/orbd
is the Object Request Broker Daemon. It is a tool to enable clients to transparently locate and invoke persistent objects on servers in the CORBA environment.osacompile
/usr/bin/osacompile
compiles the given files, or standard input if non are listed, into a single output script.osalang
/usr/bin/osalang
prints information about installed OSA (Open Script Architecture) languages.osascript
/usr/bin/osascript
executes the given script file, or standard input if none is given. Scripts may be plain text or compiled scripts.otool
/usr/bin/otool
displays specified parts of object files or libraries (similar to ldd
on Linux).pagestuff
/usr/bin/pagestuff
displays information about the specified logical pages of a file conforming to the Mach-O executable format.pax
/bin/pax
is a tool for reading, writing, and listing members ofan archive file. It is also used to copy directory hierarchies. pax
supports various archive formats such as cpio
, bcpio
, sv4cpio
, sv4crc
, tar
, and ustar
.pbcopy
/usr/bin/pbcopy
is used to copy standard input to the pasteboard buffer.pbpaste
/usr/bin/pbpaste
prints the contents of the pasteboard buffer.pcscd
/usr/sbin/pcscd
is a daemon used to dynamically allocate/deallocate Smart Card reader drivers at runtime and manage connections to the readers. Related utilities include /usr/bin/pcsctest
and /usr/bin/pcsctool
. These tools are taken from the MUSCLE (Movement for the Use of Smart Cards in a Linux Environment) project, a project to coordinate the development of smart cards and applications under Linux.pdisk
/usr/sbin/pdisk
is a menu driven program which partitions disks using the standard Apple disk partitioning scheme.plutil
/usr/bin/plutil
can be used to check the syntax of property list files, or convert a plist file from one format to another.pmset
/usr/bin/pmset
changes and reads power management settings such as idle sleep timing, wake on administrative access, automatic restart on power loss, etc.pstat
/usr/sbin/pstat
displays open file entry, swap space utilization, terminal state, and vnode data structures.redo_prebinding
/usr/bin/redo_prebinding
is used to redo the prebinding of an executable or dynamic library when one of the dependent dynamic library changes. The input file, executable or dynamic library, must have initially been prebound for this program to redo the prebinding.say
/usr/bin/say
uses the Speech Synthesis manager to convert input text to audible speech and either play it through the sound output device chosen in System Preferences or save it to an AIFF file.screencapture
/usr/sbin/screencapture
captures the screen (a window selection or a mouse selection) to the clipboard or a file (as PDF).scselect
/usr/sbin/scselect
is used to change current network location, or to list defined locations.sc_usage
/usr/bin/sc_usage
displays an ongoing sample of system call and page fault usage statistics for a given process.scutil
/usr/sbin/scutil
is a tool to communicate with configd
, read and write from/to the configuration data store etc.security
/usr/bin/security
provides a command line interface to administer Keychains, manipulate keys and certificates, and do most things the Security framework is capable of.segedit
/usr/bin/segedit
extracts and/or replaces the named sections from the specified input file and creates an output.setregion
/usr/bin/setregion
is the command line utility for setting the DVD drive's 'region'.sips
/usr/bin/sips
is a command line interface to the Scriptable Image Processing Server. The graphical abilities of Mac OS X are exposed through this image processing service. The SIPS architecture contains tools for performing basic image alterations and support various image formats. The goal is to provide quick, convenient, desktop automation of common image processing operations.slpd
Hacking Tool For Mac Os X
/usr/sbin/slpd
is the Service Location Protocol daemon that advertises local services to the network.slp_reg
/usr/sbin/slp_reg
is a tool to register URLs via the Service Location Protocol in order for remote machines to discover locally registered services.softwareupdate
/usr/sbin/softwareupdate
is a command line utility to perform software updates under Mac OS X.srm
Download Tools For Mac
/usr/bin/srm
securely (by overwriting, renaming, and truncating before unlinking) removes files or directories.sw_vers
/usr/bin/sw_vers
prints the product name (such as Mac OS X), version and build number.sysctl
/usr/sbin/sysctl
retrieves kernel state and allows processes with appropriate privilege to set kernel state.system_profiler
/usr/sbin/system_profiler
is the command line system profiling utility.tcpdump
/usr/sbin/tcpdump
dumps traffic on a network.Hack App Mac Os
top
/usr/bin/top
displays an ongoing sample of system usage statistics (such as cpu utilization, memory usage etc. for each process).trpt
/usr/sbin/trpt
interrogates the buffer of TCP trace records created when a socket is marked for debugging (via setsockopt()
) and prints a readable description of these records.update_prebinding
/usr/bin/update_prebinding
tries to synchronize prebinding information for libraries and executables when new files are added to a system. Prebinding information is pre-calculated address information for libraries used by a given executable or library. By pre-determining where a function in another library is destined to be placed, the dynamic linker does not have to resolve symbols at application startup time.vm_stat
/usr/bin/vm_stat
displays Mach virtual memory statistics.vmmap
Hacking Tools For Windows
/usr/bin/vmmap
displays the virtual memory regions allocated in a specified process, indicating how memory is being used, and what the purposes of memory at a given address might be.vpnd
/usr/sbin/vpnd
is the Mac OS X VPN service daemon.xcode*
/usr/bin/xcode*
are Xcode related commands.Hack App Store Mac Os X
xxd
/usr/bin/xxd
creates a hex dump of a given file or standard input. It can also convert a hex dump back to its original binary form.