phpMD5raptor version 0.1b is a MD5 bruteforcing tool.
ab7225238c280d24104c95441f259cccbea89441ea62fede40cff0d9bd94c14f
htpasswd cracker written in python.
1a655a88abfc58bc6f1cfe3c9963e59e8f703a0f4353add6085f5a34fff4941e
PyCrack is a wordlist password cracker written in Python and using the native crypt() function to generate hashes.
08ce9a26f0cd4d6b115678fb68656d844431413b203f0d1c8eeb462b8ffde0b4
SIPcrack is a SIP protocol login cracker. It contains 2 programs, SIPdump to sniff SIP logins over the network and SIPcrack to bruteforce the passwords of the sniffed logins.
fb62d98c201b4fba469621bb55d9b2fbc6978f6b3a39048f7ed39f50ff3afc05
Xlcrack is a small tool to recover lost and forgotten passwords from XLS files. Works on most Un*x systems, but it needs libgsf, most commonly installed along with Gnumeric. Some newer XLS files are not suitable for password recovery using this software - works on Excel 95 and older.
ad01be3262726d94774f519ffb920a925abe95c483d05105b596c372cc13dcf5
Wyd is a password profiling tool that is able to parse different types of files and generate a wordlist out of them which can be used for a wordlist attack on passwords. It is very effective to get reasonable passwords from websites or filesystems.
70085fcfa8bfff41d6b6bb4522d9437ad62262ab39fa98d3d8076d54bb06dcb9
Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common usernames and passwords, username derivations, and common username/password pairs. It is used both to test the security of your site and to highlight the insecurity of HTTP authentication due to the fact that users just don't pick good passwords.
041b5668ad440fa0a752ab4f956da4a64dc6403df1b48f8cfe342631b275f447
Brute forcing and dictionary attack script for Wordpress.
81bca061625125a0ce7c95bc47a1a3f6b6fedd13b426a0c36d5c8c092265875e
SLRC is a simple bash script put together to crack rar archives on Linux.
3eb62117334b9dc42cf227a04409053ed722aa6e8092e51f6c63540a8b3f0a94
Digipass Go3 token dumper utility that is based on the reverse engineering of Vasco's Digipass Go3 algorithm.
30ad336dfaf9d1ab3b6c7c281092a6f3f3b82640857577895100ecc33c895d68
MDCrack is a free, feature filled password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multithreading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s).
9593af74b8a11d0e64180ad1fb001d350707f3825c6d32f9b31644937f17766c
FBF - FTP Brute Forcer: This is a ftp brute force dictionary attacker that can read a list of users or specified user and run a password list attack against them. The brute forcer has a delay option which makes it not clog up the server with to many connections the option is defaulted to 10 seconds but can be changed for longer iterations. Inside the tar is a the fbf.pl, and user and password list.
493b64ffea8b20ec4c603181141174f6b9629306625f54db9b4327f20bd7464c
MDCrack is a free, feature filled password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multithreading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s).
d82d9d0897fb3dcca072bcf641acc2c197e69d17e77d40bc57f48b84b307a906
A small C program that can brute force gadu-gadu accounts starting from a given number and using a hardcoded list of passwords.
048dcc6171b1c08f6132e372e9ac410d6b68d1e47402d1a2901c9bb8bf5528e7
Wyd is a tool for password profiling. The general idea is to personalize or profile the available data about a "target" person or system and generate a wordlist of possible passwords/passphrases out of available information. Instead of just using the command 'strings' to extract all the printable characters out of all type of files, we wanted to eliminate as much false-positives as possible. The goal was to exclude as much "unusable" data as possible to get an effective list of possible passwords/passphrases. It is very effective to get reasonable passwords from websites or filesystems.
3581d74785a5071ea404d0bbe59de4768ac89952f157729de10a21ab0abb2277
DNS brute forcing utility that can query 2000 domains in 9 seconds.
7cbacc7bdd8d516ad1652127af80f30f961a50e0f8812695af8d14d033224271
Very small python program that attempts to crack a md5 hash using an external wordlist.
d9432ac047f99766329e140a2cff5d6332507aaf07eda2699e62f22d3b80ae5d
Wordlist taken from the book "1984" by George Orwell.
143b2519f0444b8ee40a559af0f12dd7a7236caf34ef2113fff46b14cd4d2449
md5tables is a shell script that references a wordlist of md5 hashes and words for password auditing.
c9ba9acafe6babf9fadbb9d9c6394ac75654d69684da4c884029cedd12da9237
MDCrack is a free, feature filled password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multithreading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s).
e7746486dd30fc6921a9e419810f4a9c48ca31e4139cb7b2298bfea7b4875075
MD5 recomputation proof of concept utility.
5ac647a903b57757dcfdf0d60895e4eaccee583636e5928d54d7f91200faec58
Bob the Butcher is a distributed password cracker. It is built around a client/server system. Cracking speed scales linearly with the number of connected clients. It is designed for efficient cracking resource usage. It will handle many password files at once, aggregating passwords as much as possible.
8e5b5cd9dbc6d44ba2d7227a9394e95e0aec3658a717dc238f6a8330049dc772
Ophcrack is a cracker aimed at NT-style (LANMAN) password-hashes. It uses a large precomputed hash database to crack the majority of all passwords within a matter of seconds, rather than hours or days as would be the case if you search the entire likely keyspace each time you are looking for a specific password. This type of cracking is based on a technique referred to as "rainbow tables".
b8ad977b2c1835f6ce705ef6c2faf13a0dbf98445b72b60c7697fb5077503a3d
Brute forcing utility for pswd.js, a common client-side authentication program.
a74cc082a3dfa8b02ddefa49effca8a21773eb603eee3f70c14832ee111781ef
VNCcrack is a simple, fast offline-mode VNC password cracker. It takes a set of challenge-response pairs of the type passed during a VNC authentication attempt, and attempts to recover the passwords using a dictionary file.
af0a1e85e9d10df8f32439a3c084f613eb295464becf9dd61d93de385277d66b