what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 159 RSS Feed

Files

SSHatter Brute Forcer 1.0
Posted Dec 15, 2009
Authored by Tim Brown | Site nth-dimension.org.uk

SSHatter is a remote brute force utility that attempts every password from a given list against a target.

Changes: This release adds dumb mode, where SSHatter will check password equals password, username, and blank. It adds sudo mode, where SSHatter will echo the password to STDIN. It adds rudimentry file transfer modes, which also work interactively via "put" and "get". It improves the usage message. There is a new command line interface based on Getops. There is a modular design to allow more code reuse, a new threading model, support for SSH private keys, mass mode for post brute force command execution, and interactive mode for post brute force command execution. Timing attack based username enumeration has been removed for now.
tags | remote
SHA-256 | 9c288bea73f302b726bbb13e21594df22b82f73f874f130fb60e626f3abd3b2a
SSHatter-0.6.tar.gz
Posted Oct 8, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

SSHatter is a remote brute force utility that attempts every password from a given list against a target.

tags | remote
SHA-256 | 74989fe4b419899604f6db0946f0e0314f97a42cecc49672b4bf78d580842226
SSHatter-0.5.tar.gz
Posted Sep 26, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

SSHatter is a remote brute force utility that attempts every password from a given list against a target.

tags | remote
SHA-256 | 690c0e0d317026df8d9c423cc3c6e552372dbbaaab16953a32d76b120fd720c5
SSHatter-0.3.tar.gz
Posted Sep 11, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

SSHatter is a remote brute force utility that attempts every password from a given list against a target.

tags | remote
SHA-256 | ccf0f5f7aa39fb59f5f5b2bd959ec841ca04f761de5c1c2da76f97a1bfa7976b
SSHatter-0.2.tar.gz
Posted Aug 11, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

SSHatter is a remote brute force utility that attempts every password from a given list against a target.

tags | remote
SHA-256 | f36698575e0aefc1ed0903dc22c54cd9ffdeb171aa4341ea9cc93b770555d3ad
md5fuck.pl.txt
Posted Feb 13, 2007
Authored by Iman Karim | Site home.inf.fh-rhein-sieg.de

MD5 hash brute forcing utility.

SHA-256 | 33d7e9e56e18e575f25076691fa9321cf18d5d0a1578fbed06bedead098bf7ad
msnPass.txt
Posted Aug 18, 2005
Authored by Gregory R. Panakkal | Site infogreg.com

MSN Messenger password decrypter for Microsoft Windows XP and 2003. Includes the entropy value thrown in from the credui.dll GUID.

systems | windows
SHA-256 | 73d3162712d5b43af42864df4b5146f3dfcd067cb576e0530d1faa70df6ffa24
priv8hex.c
Posted Jul 26, 2004
Authored by konewka | Site priv8security.com

Simple utility to view hex.

SHA-256 | aac4af0dd11b60dd8e9c9f7d53aac544ce99b0e1fedce792e18d52f71a54f3c7
expnbrute.c
Posted Jul 18, 2004
Authored by CoKi | Site nosystem.com.ar

Utility that attempts to find whether or not users exist on an SMTP server using the EXPN command against a list of user names.

SHA-256 | 73346010d346ef624f1a57c55f0aaafd2fb9476ea1e7678b6e797981f5d167fb
crunch.cpp
Posted Jul 3, 2004
Site aciiid.ath.cx

Password-list generator, needs to be compiled, written in C++. Generates lists of passwords given a length, character-set, and/or pattern. Can then be piped to whatever or redirected to a file.

SHA-256 | 644732a7239e934f0a2465eef551bc2ecbd432203700c143e09b80ea65b12443
x25bru.c
Posted May 9, 2004
Authored by Inode | Site wayreth.eu.org

Multithreaded multi-link X.25 Pad password brute-forcing utility. Tested on Solaris. The speed of this software will depend on network congestion and the number of free outgoing links.

systems | solaris
SHA-256 | 0376e9b17ff926409fad0c905df32f253c46300171d706ec8aae3ca07053102c
aimcrack-0.1.tar.gz
Posted Jun 11, 2003
Authored by methodic | Site libpcap.net

Utility to brute-force AIM screenames and passwords. In a list of about 1500 passwords, aimcrack takes about 2 hours on a cable modem connection.

SHA-256 | 8a31be4fe67114eca89d80ed2320768f4dfad6d2e8e37c1bbc41a3238e7bf9a3
bvi-1.3.1.src.tar.gz
Posted Feb 26, 2002
Authored by Gerhard Buergmann

BVI v1.1.1 is an editor for binary files using common vi - commands and additional commands for binary search and substitution.

Changes: Bug fixes and updates.
SHA-256 | c94dbfa293cbc61b8571d025e90fd1f06a34f8d4e5b11a59856bfc1f13014de3
hexedit-0.9.7.tar.gz
Posted Feb 13, 2000
Authored by Adam Rogoyski

ncurses Hexedit is a full screen hex editor using the curses, ncurses (4.2), or pdcurses library. Features: familiar setup, similiar to Norton's Diskedit, File Selection widget for selecting a file to edit, allows Inserting and Deleting bytes from the file, fast boyer-moore string and byte searches, Undo - keeps track of all changes, reverting back to original always possible, base conversion/calculator utility built in, portable.

Changes: Color support added, bug fixes.
SHA-256 | 3d15ab33dae9014180cc3d54636aaab4d9c88257f7a2d1cfda490d1bfa6e043a
cracking2.txt
Posted Oct 27, 1999
Authored by Techlord | Site blacksun.box.sk

Techlord's second cracking tutorial. This one will guide you through the cracking process of a small program, and help you under stand all the steps involved in cracking.

SHA-256 | e803f72a65f8cc8dcb206d3258ec9d4593fa5d20dc608d7cde6804d8f708540d
vche-1.7.2.tar.gz
Posted Oct 8, 1999
Authored by Diego Javier Grigna | Site grigna.com

The Virtual Console Hex Editor uses the /dev/vcsa* devices to let you see all 256 characters as found in video ROM, even control and extended ASCII characters. It can edit non-regular files like hard disks, floppies, CDROMs, ZIPs, RAM, and almost any device. It comes with an ncurses and a raw version, for people who work under X or remotely.

SHA-256 | 3142dd3ed8b7c75febfe1dab2fb3437e2a41948a4726da0657fb4057450ffd00
cracking.txt
Posted Sep 26, 1999

Cracking, Part I (version 1.0) - learn how to crack programs.

SHA-256 | b611ef16197fa5d62fae6c0ef18bdc6f470e18b6049b47773df700dc86e21c40
bed-0.0.6.src.tar.gz
Posted Aug 17, 1999
Authored by Jaap Korthals Altes

Binary EDitor v0.0.6 is a menu driven Binary Editor. Contains copy, past, undo, redo, search, replace, marks, marklisting, mark stepping, Ascii, Decimal, Hexedecinal, Binary and Octal dataformats, Multiple files on one screen. It has practically no limit on filesize (you can edit harddrive devices with it), it has color, key configuration and plugin support.

SHA-256 | 6a214a457cb44813e68e5894464ae040d9739e9d5d1cefa3168c3b78fdcac294
le-1.5.2.tar.gz
Posted Aug 17, 1999
Authored by Alexander V. Lukyanov

LE text editor v1.5.2 - LE has many block operations with stream and rectangular blocks, can edit both unix and dos style files (LF/CRLF), is binary clean, has hex mode, can edit files and mmappable devices in mmap shared mode (only replace), has tunable syntax highlighting, tunable color scheme (can use default colors), tunable key map. It is slightly similar to Norton Editor, but has more features.

systems | unix
SHA-256 | a21cb5902c0cfff12ea7250d33237db487aaa6e5d02a88ab00340867e00941fc
ORC.howto.9.4.html
Posted Aug 17, 1999

How to crack in Windows.

systems | windows
SHA-256 | 32ea57876a2e266fca0dd979a6a237b755d9c631feb8299812a15ad6e54ca238
win_asm.zip
Posted Aug 17, 1999

No information is available for this file.

SHA-256 | a770233e5c87344cdec931cae107c188af1f4fdf8ce7a2b8d2213c3e784e1f03
win32asm.zip
Posted Aug 17, 1999

No information is available for this file.

SHA-256 | 0b1507eaeee630e0d666305f59617ce9dab42039882b01eeba4ac30a0818666f
windis.zip
Posted Aug 17, 1999

No information is available for this file.

SHA-256 | 40c2b4f94a5a8336beaca998e384fd67dd7c9e49a0a7f8340e72a481540344ba
winshow.zip
Posted Aug 17, 1999

No information is available for this file.

SHA-256 | 731db2448b82fd9b6e8f501abf7e51f5a5a0cdf4ce4e88f3ebeb1c79a1917103
wsockspy.zip
Posted Aug 17, 1999

No information is available for this file.

SHA-256 | ba947f4302539d854839a6c899dad2e9437162b96dc7011e836c42b35a308601
Page 1 of 7
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
North Korean Hackers Hijack Antivirus Updates For Malware Delivery
Posted Apr 24, 2024

tags | headline, hacker, government, malware, flaw, cyberwar, military, north korea
CISA Warns Of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
Posted Apr 24, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar
US Charges Iranians With Cyber Snooping On Government, Companies
Posted Apr 24, 2024

tags | headline, hacker, government, privacy, usa, cyberwar, spyware, iran
TensorFlow AI Models At Risk Due To Keras API Flaw
Posted Apr 24, 2024

tags | headline, flaw
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close