Files are presented for prevention purposes only - The operator of this
site will cooperate with law enforcement in tracking down and bringing to
justice anyone who commits any crime with the information in this directory
|
|
cialtrop.txt 4442 bytes. by United States Central Intelligence Agency
(2009)
|
The CIA on Caltrops
|
telacc~1.txt 10960 bytes. (1999)
|
Getting Physical Access to Server and Telecom Rooms
Countersecurity
|
simplex.txt 24181 bytes. |
5-button Simplex Locks
Countersecurity
Locksmithing
|
sewer.jpg 55637 bytes. |
A Bell manhole or sewer
Phreak System Info
|
simplex2.txt 24749 bytes. |
A list of all Simplex lock combinations
Countersecurity
Locksmithing
|
atheft.txt 42304 bytes. |
Auto Theft - a practical approach
Countersecurity
|
trashis.txt 5893 bytes. |
Basic Trashing Manual
Trashing
|
library.txt 7015 bytes. |
Beating the Library
Countersecurity
|
trashing.txt 3892 bytes. |
Bell Trashing
Trashing
|
trashng.txt 6704 bytes. |
Better Homes & Trashing
Trashing
|
beycha.txt 7975 bytes. |
Beyond Chapstick - More scantron methods
Countersecurity
|
lausd.txt 28672 bytes. |
Breaking into Los Angeles Schools
Countersecurity
|
mdbmbtp.txt 3936 bytes. (1995)
|
British Telecom Bomb Threat Policy (Gotta love that IRA)
Countersecurity
|
cmpheist.txt 5360 bytes. |
Computer Heisting from Schools
Countersecurity
|
drillpik.txt 1042 bytes. |
Drill pick for locks
Countersecurity
Locksmithing
|
ezpick.txt 1206 bytes. |
Easy Lockpick
Countersecurity
Locksmithing
|
dumpster.gif 112167 bytes. |
Flyer distributed to Ameritech employees - "Dumpster Diving is a Real Threat!"
Trashing
|
alarms.txt 2721 bytes. |
Fun with Alarms
Countersecurity
|
libraryo.txt 5888 bytes. |
Getting free books and free EVERYTHING from the library
Countersecurity
|
inrs.txt 9375 bytes. |
Getting into R rated movies
Countersecurity
|
adtrash1.txt 7440 bytes. (1999)
|
Hack Canada's Adventures in Trashing I
Trashing
|
index~1.htm 3086 bytes. (1996)
|
Hackerz Guide to Lock Picking
Locksmithing
|
hotwire.txt 838 bytes. |
How to Hotwire a Car
Countersecurity
|
b_e.txt 3114 bytes. |
How to break into a house
Countersecurity
|
ai-attma.txt 5889 bytes. |
How to break into an AT&T Manhole and get away with it!
Countersecurity
|
mastlock.txt 8163 bytes. |
How to get/make master lock keys
Countersecurity
Locksmithing
|
lockimpr.txt 1356 bytes. |
How to impression a key lock
Countersecurity
Locksmithing
|
shoplft2.txt 6439 bytes. |
How to shoplift, part two. By ZiGGY
Countersecurity
|
jockybox.txt 3587 bytes. |
Jocky Boxing: Entering cars.
Countersecurity
|
sslairs.txt 10190 bytes. |
Known US Secret Service Offices - from 2600
Countersecurity
|
lol_013.txt 37811 bytes. |
Legions of Lucifer: A complete guide to car theft
Countersecurity
|
dstrylox.txt 1746 bytes. |
Lock Destruction
Countersecurity
|
lockpick.txt 6319 bytes. |
Lock Picking
Countersecurity
Locksmithing
|
nrk12.txt 3533 bytes. |
Lock Picking
Countersecurity
Locksmithing
|
sanlock1.txt 33616 bytes. |
Lock Picking File From Sanctuary
Countersecurity
Locksmithing
|
sanlock2.txt 33437 bytes. |
Lock Picking File From Sanctuary
Countersecurity
Locksmithing
|
sanlock3.txt 13365 bytes. |
Lock Picking File From Sanctuary
Countersecurity
Locksmithing
|
lckpik.txt 3939 bytes. |
Lock Picking by Black Cobra
Countersecurity
Locksmithing
|
lockshop.txt 8982 bytes. |
Lock Picking/Smithing Information
Countersecurity
Locksmithing
|
lockerdx.txt 8068 bytes. |
Locker Docs
Countersecurity
Locksmithing
|
mitloc~1.pdf 521075 bytes. (1996)
|
MIT Guide to Lock Picking - Adobe Acrobat Format
Locksmithing
|
mitloc~1.ps 818540 bytes. (1996)
|
MIT Guide to Lock Picking - Postscript Format
Locksmithing
|
guide.zip 418642 bytes. (1997)
|
MIT Guide to Lock Picking - HTML Format
Countersecurity
Locksmithing
|
master1.txt 8052 bytes. |
Master Lock Picking File 1
Countersecurity
Locksmithing
|
master2.txt 3439 bytes. |
Master Lock Picking File 2
Countersecurity
Locksmithing
|
master3.txt 1590 bytes. |
Master Lock Picking File 3
Countersecurity
Locksmithing
|
miracle.txt 7517 bytes. |
Miracle Lock Picking
Countersecurity
Locksmithing
|
ssfreq2.txt 6175 bytes. |
More Secret Service Radio Frequencies
Countersecurity
|
mt.txt 7059 bytes. |
More Trashing-A Filthy Business
Trashing
|
newlocks.txt 14370 bytes. |
New lock mechanisms
Countersecurity
Locksmithing
|
nrk94.txt 927 bytes. |
Opening Post Office Boxes
Countersecurity
Locksmithing
|
locks2.txt 7457 bytes. |
Picking locks #2
Countersecurity
Locksmithing
|
readmail.txt 3478 bytes. |
Reading unopened mail
Countersecurity
Postal Scams
|
survaili.txt 6623 bytes. |
Remote surveillance by CCTV
Countersecurity
|
robbing1.txt 10066 bytes. |
Robbing Houses 1 of 3
Countersecurity
|
robbing2.txt 7720 bytes. |
Robbing Houses 2 of 3
Countersecurity
|
robbing3.txt 15418 bytes. |
Robbing Houses 3 of 3
Countersecurity
|
burglar.txt 8377 bytes. |
Robbing Houses for Phun and Profit
Countersecurity
|
safepick.txt 4752 bytes. |
Safe Cracking Via the "Sound" Method
Countersecurity
Locksmithing
|
sscodes.txt 10958 bytes. |
Secret Service Codenames - People, places, things.
Countersecurity
|
ssfreq1.txt 4917 bytes. |
Secret Service Radio Frequencies
Countersecurity
|
shimming.txt 3590 bytes. |
Shimming Doors
Countersecurity
|
simplexl.txt 23601 bytes. |
Simplex 5-button combination locks
Countersecurity
Locksmithing
|
vidoetap.txt 2953 bytes. |
Stealing videotapes
Countersecurity
|
s_shack1.txt 9189 bytes. |
Stop & Shop Hack Booklet #1
Countersecurity
|
s_shack2.txt 8062 bytes. |
Stop & Shop Hack Booklet #2
Countersecurity
|
lps.txt 10285 bytes. |
The Art of Lockpicking
Countersecurity
Locksmithing
|
locksci.txt 9510 bytes. |
The science of opening locks
Countersecurity
Locksmithing
|
safesci.txt 10157 bytes. |
The science of opening safes
Countersecurity
Locksmithing
|
trash3.txt 3493 bytes. |
Trashing Techniques
Trashing
|
vas018.txt 5665 bytes. |
VAS #18: How to make your own SlimJim
Countersecurity
|
vas042.txt 50731 bytes. |
VAS #42: Almost Everything You Ever Wanted To Know About Security
Countersecurity
|
vas063.txt 4690 bytes. |
VAS #63: Some good security books
Countersecurity
|
vas083.txt 8440 bytes. |
VAS #83: Proper theft techniques
Countersecurity
|
vas089.txt 6337 bytes. |
VAS #89: Late Night Revenue
Countersecurity
|
vendkey.txt 828 bytes. |
Vending Machine Keys
Countersecurity
Locksmithing
|
(
|
blueline.gif 1206 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
contents.gif 278 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
flesh.jpg 2001 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
icon_key.gif 648 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
icon_s~1.gif 471 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
knot.gif 348 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-dbl~1.htm 2317 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f001.gif 7014 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f002.gif 7271 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f003.gif 5006 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f004.gif 3690 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f005.gif 4873 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f006.gif 5829 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f007.gif 4704 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f008.gif 3936 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f009.gif 4961 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f010.gif 4729 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f011.gif 4369 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f015.gif 4375 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f016.gif 3243 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f017.gif 3030 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f018.gif 3370 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f019.gif 4165 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-f020.gif 6208 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-ide~1.htm 1775 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-int~1.htm 3554 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-mag~1.htm 3028 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-m_n~1.htm 1656 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-pin~1.htm 5195 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-p_n~1.htm 1609 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-tip~1.htm 12422 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-too~1.htm 8265 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-tub~1.htm 4503 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
lp-waf~1.htm 4531 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
redbal~1.gif 870 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
|
warning.gif 884 bytes. |
(Accessory file for The Hackers Guide to Lockpicking)
)
|
adt.txt 3935 bytes. (2001)
|
Programming ADT Alarms
Countersecurity
|
elp.txt 1200 bytes. by Wyzewun
(1999)
|
Fundamentals of Electronic Lockpicking
Countersecurity
|
te2000.txt 6219 bytes. by Jenn
(2001)
|
The Amtel 2000 Tele-Entry System
Countersecurity
|
how%20~1.txt 2850 bytes. by Mr. Puff N Stuff
|
How to have a profitable ID business
|
nitemove.htm 308002 bytes. (1913)
|
Night Movements - translated from Japanese
|
spuncpc.txt 2077 bytes. by Ripmax
(1994)
|
Spotting Undercover Police Cars (in Australia)
Local: Australia
|
manhole.txt 4728 bytes. |
How to break into an AT&T Manhole and get away with it!
|
qkroofin.txt 2054 bytes. (2001)
|
A Quick Word on Roofing
|
upl011.txt 40331 bytes. by Rufus T. Firefly
(1999)
|
Shoplifting for Dummies
|
urbex.txt 2458 bytes. (2003)
|
Urban's Guide to UrbEx
|
nightime.txt 6253 bytes. (2003)
|
Safety in Night Time Activities
|
ddiving.txt 4196 bytes. by N. Willhite
|
Dumpster Diving
|
toolchck.doc 6144 bytes. (2001)
|
Tool Checklist for a Saboteur
(Ed. Note: Lists like this are actually rather dangerous... it
is considered best practice to carry only the minimum required
equipment on any kind of caper, so as to minimize the numerous
risks involved in being overequipped, including reduced mobility,
more to ditch or abandon in the event of a quick getaway, and
the possibility of being suspected or accused of greater crimes
than you intended based on what *could* have been done
using all the extra crap you were caught with. Don't bring your
fucking cellphone. It might ring at a bad time... )
|