exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 251 - 275 of 760 RSS Feed

Files

phpMD5raptor-0_1b_php.txt
Posted May 4, 2007
Authored by Vagner Rodrigues Fernandes | Site vrodrigues.com

phpMD5raptor version 0.1b is a MD5 bruteforcing tool.

tags | cracker
SHA-256 | ab7225238c280d24104c95441f259cccbea89441ea62fede40cff0d9bd94c14f
htcrack_py.txt
Posted Apr 7, 2007
Authored by d3hydr8 | Site darkcode.ath.cx

htpasswd cracker written in python.

tags | cracker, python
SHA-256 | 1a655a88abfc58bc6f1cfe3c9963e59e8f703a0f4353add6085f5a34fff4941e
pycrack.txt
Posted Mar 20, 2007
Authored by Matthew Ranostay

PyCrack is a wordlist password cracker written in Python and using the native crypt() function to generate hashes.

tags | cracker, python
SHA-256 | 08ce9a26f0cd4d6b115678fb68656d844431413b203f0d1c8eeb462b8ffde0b4
SIPcrack-0.2.tar.gz
Posted Mar 6, 2007
Authored by Martin J. Muench | Site codito.de

SIPcrack is a SIP protocol login cracker. It contains 2 programs, SIPdump to sniff SIP logins over the network and SIPcrack to bruteforce the passwords of the sniffed logins.

Changes: Added support for different methods, proxy-authorization, qop, cnonce, etc.
tags | cracker, protocol
SHA-256 | fb62d98c201b4fba469621bb55d9b2fbc6978f6b3a39048f7ed39f50ff3afc05
xlcrack-1.2.tar.gz
Posted Mar 4, 2007
Authored by Nick Lamb | Site devel.tlrmx.org

Xlcrack is a small tool to recover lost and forgotten passwords from XLS files. Works on most Un*x systems, but it needs libgsf, most commonly installed along with Gnumeric. Some newer XLS files are not suitable for password recovery using this software - works on Excel 95 and older.

Changes: Added better support for non-ascii characters, fixed bugs and updated homepage.
tags | cracker
SHA-256 | ad01be3262726d94774f519ffb920a925abe95c483d05105b596c372cc13dcf5
wyd-0.2.tar.gz
Posted Feb 23, 2007
Authored by Max Moser, Martin J. Muench | Site remote-exploit.org

Wyd is a password profiling tool that is able to parse different types of files and generate a wordlist out of them which can be used for a wordlist attack on passwords. It is very effective to get reasonable passwords from websites or filesystems.

tags | cracker
SHA-256 | 70085fcfa8bfff41d6b6bb4522d9437ad62262ab39fa98d3d8076d54bb06dcb9
authforce-0.9.8.tar.gz
Posted Feb 14, 2007
Site kapheine.hypa.net

Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common usernames and passwords, username derivations, and common username/password pairs. It is used both to test the security of your site and to highlight the insecurity of HTTP authentication due to the fact that users just don't pick good passwords.

Changes: Various bug fixes.
tags | web, cracker
SHA-256 | 041b5668ad440fa0a752ab4f956da4a64dc6403df1b48f8cfe342631b275f447
wpattack-py.txt
Posted Jan 5, 2007
Authored by Kad

Brute forcing and dictionary attack script for Wordpress.

tags | cracker
SHA-256 | 81bca061625125a0ce7c95bc47a1a3f6b6fedd13b426a0c36d5c8c092265875e
slrc.sh.txt
Posted Nov 16, 2006
Authored by Stefan Behte | Site ge.mine.nu

SLRC is a simple bash script put together to crack rar archives on Linux.

tags | cracker, bash
systems | linux
SHA-256 | 3eb62117334b9dc42cf227a04409053ed722aa6e8092e51f6c63540a8b3f0a94
digitoken.txt
Posted Nov 14, 2006
Authored by fc

Digipass Go3 token dumper utility that is based on the reverse engineering of Vasco's Digipass Go3 algorithm.

tags | cracker
SHA-256 | 30ad336dfaf9d1ab3b6c7c281092a6f3f3b82640857577895100ecc33c895d68
MDCrack-17.zip
Posted Oct 31, 2006
Authored by Gregory Duchemin | Site mdcrack.openwall.net

MDCrack is a free, feature filled password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multithreading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s).

Changes: This release includes several bug fixes along with 6 new cores supporting FreeBSD MD5, Apache MD5 and Cisco IOS hashes.
tags | cracker
SHA-256 | 9593af74b8a11d0e64180ad1fb001d350707f3825c6d32f9b31644937f17766c
fbf.tgz
Posted Oct 25, 2006
Authored by free0n | Site doomriderz.co.nr

FBF - FTP Brute Forcer: This is a ftp brute force dictionary attacker that can read a list of users or specified user and run a password list attack against them. The brute forcer has a delay option which makes it not clog up the server with to many connections the option is defaulted to 10 seconds but can be changed for longer iterations. Inside the tar is a the fbf.pl, and user and password list.

tags | cracker
SHA-256 | 493b64ffea8b20ec4c603181141174f6b9629306625f54db9b4327f20bd7464c
MDCrack-16.zip
Posted Oct 21, 2006
Authored by Gregory Duchemin | Site mdcrack.openwall.net

MDCrack is a free, feature filled password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multithreading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s).

Changes: This release includes several bug fixes along with 8 new cores supporting HMAC MD4 and HMAC MD5.
tags | cracker
SHA-256 | d82d9d0897fb3dcca072bcf641acc2c197e69d17e77d40bc57f48b84b307a906
gg_bf.c
Posted Oct 20, 2006
Authored by Aleksander Ambrozkiewicz

A small C program that can brute force gadu-gadu accounts starting from a given number and using a hardcoded list of passwords.

tags | cracker
SHA-256 | 048dcc6171b1c08f6132e372e9ac410d6b68d1e47402d1a2901c9bb8bf5528e7
wyd.tar.gz
Posted Oct 20, 2006
Authored by Max Moser | Site remote-exploit.org

Wyd is a tool for password profiling. The general idea is to personalize or profile the available data about a "target" person or system and generate a wordlist of possible passwords/passphrases out of available information. Instead of just using the command 'strings' to extract all the printable characters out of all type of files, we wanted to eliminate as much false-positives as possible. The goal was to exclude as much "unusable" data as possible to get an effective list of possible passwords/passphrases. It is very effective to get reasonable passwords from websites or filesystems.

tags | cracker
SHA-256 | 3581d74785a5071ea404d0bbe59de4768ac89952f157729de10a21ab0abb2277
DNSBruteforce.tar.gz
Posted Oct 9, 2006
Site revhosts.org

DNS brute forcing utility that can query 2000 domains in 9 seconds.

tags | cracker
SHA-256 | 7cbacc7bdd8d516ad1652127af80f30f961a50e0f8812695af8d14d033224271
md5crack_py.txt
Posted Oct 3, 2006
Authored by d3hydr8 | Site darkcode.ath.cx

Very small python program that attempts to crack a md5 hash using an external wordlist.

tags | cracker, python
SHA-256 | d9432ac047f99766329e140a2cff5d6332507aaf07eda2699e62f22d3b80ae5d
1984.txt.gz
Posted Sep 22, 2006
Authored by Cody "CypherXero" Rester | Site cypherxero.net

Wordlist taken from the book "1984" by George Orwell.

tags | cracker
SHA-256 | 143b2519f0444b8ee40a559af0f12dd7a7236caf34ef2113fff46b14cd4d2449
md5tables-0.2.tar.gz
Posted Sep 16, 2006
Authored by Cody "CypherXero" Rester | Site cypherxero.net

md5tables is a shell script that references a wordlist of md5 hashes and words for password auditing.

tags | shell, cracker
SHA-256 | c9ba9acafe6babf9fadbb9d9c6394ac75654d69684da4c884029cedd12da9237
MDCrack-15.zip
Posted Sep 7, 2006
Authored by Gregory Duchemin | Site mdcrack.openwall.net

MDCrack is a free, feature filled password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multithreading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s).

tags | cracker
SHA-256 | e7746486dd30fc6921a9e419810f4a9c48ca31e4139cb7b2298bfea7b4875075
fuckmd5.cpp
Posted Aug 27, 2006
Authored by slythers

MD5 recomputation proof of concept utility.

tags | cracker, proof of concept
SHA-256 | 5ac647a903b57757dcfdf0d60895e4eaccee583636e5928d54d7f91200faec58
bob-the-butcher-0.7.1.tar.gz
Posted Aug 27, 2006
Authored by bartavelle | Site banquise.net

Bob the Butcher is a distributed password cracker. It is built around a client/server system. Cracking speed scales linearly with the number of connected clients. It is designed for efficient cracking resource usage. It will handle many password files at once, aggregating passwords as much as possible.

Changes: Better functionality on Solaris. Major bug fixes.
tags | cracker
SHA-256 | 8e5b5cd9dbc6d44ba2d7227a9394e95e0aec3658a717dc238f6a8330049dc772
ophcrack-2.3.1.tar.gz
Posted Aug 27, 2006
Site ophcrack.sourceforge.net

Ophcrack is a cracker aimed at NT-style (LANMAN) password-hashes. It uses a large precomputed hash database to crack the majority of all passwords within a matter of seconds, rather than hours or days as would be the case if you search the entire likely keyspace each time you are looking for a specific password. This type of cracking is based on a technique referred to as "rainbow tables".

Changes: Bug fixes.
tags | cracker
SHA-256 | b8ad977b2c1835f6ce705ef6c2faf13a0dbf98445b72b60c7697fb5077503a3d
pswd-brute.txt
Posted Aug 17, 2006
Authored by Gianstefano Monni

Brute forcing utility for pswd.js, a common client-side authentication program.

tags | cracker
SHA-256 | a74cc082a3dfa8b02ddefa49effca8a21773eb603eee3f70c14832ee111781ef
VNCcrack-1.0.0.tgz
Posted Jul 24, 2006
Authored by Jack Lloyd | Site randombit.net

VNCcrack is a simple, fast offline-mode VNC password cracker. It takes a set of challenge-response pairs of the type passed during a VNC authentication attempt, and attempts to recover the passwords using a dictionary file.

tags | cracker
SHA-256 | af0a1e85e9d10df8f32439a3c084f613eb295464becf9dd61d93de385277d66b
Page 11 of 31
Back910111213Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
MarineMax Notifying 123,000 Of Data Breach
Posted Jul 18, 2024

tags | headline, hacker, privacy, malware, data loss, cryptography
Recent Adobe Commerce Vulnerability Exploited In Wild
Posted Jul 18, 2024

tags | headline, flaw, adobe
Pentagon Leaker Jack Teixeira To Face Military Court-Martial
Posted Jul 18, 2024

tags | headline, government, usa, data loss, military
Malware Scammers Gearing Up For 2024 Summer Olympics
Posted Jul 18, 2024

tags | headline, hacker, malware, cybercrime, fraud, france
Vulnerability In Cisco Smart Software Manager Lets Attacker Change Any User Password
Posted Jul 18, 2024

tags | headline, hacker, flaw, password, cisco
FIN7 Is Peddling EDR-Nerfing Malware To Ransomware Operators
Posted Jul 18, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Iran Phishes Israeli Orgs With Custom BugSleep Backdoor
Posted Jul 17, 2024

tags | headline, hacker, malware, cyberwar, israel, phish, iran, backdoor
Ransomware Continues To Pile On Costs For Critical Infrastructure Victims
Posted Jul 17, 2024

tags | headline, hacker, malware, cybercrime, cryptography
Atlassian Patches High Severity Vulns In Bamboo, Confluence, Jira
Posted Jul 17, 2024

tags | headline, flaw, patch
Rite Aid Says Hack Impacts 2.2 Million People
Posted Jul 17, 2024

tags | headline, hacker, privacy, malware, cybercrime, data loss, cryptography
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close