CIntruder is an automatic pentesting tool to bypass CAPTCHA.
fa868d99ec63a9546bfcf6470f37864bcf439ef330597aef4c46e8eb1fdbd50b
CIntruder version 0.1 is an automatic pentesting tool to bypass CAPTCHA.
026ca20799a94b1338bcf11490052923d2758590e721e6a6b88925b65dfe8cca
THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
f15c6b833c6c34891aacefa1c6d1afb67d0d50350d26273a784e29114f69970e
This is a small application built to demo the weakness in pgsql and networking. It is capable of running login attempts from multiple threads in parallel and can run up to 1024 concurrent connections.
a1cbc90da097874a42f190353d335d48e7833a5c03b38e5d2c09ee9a1505b115
This is a small application built to test the performance of a http authentication system using a lot of concurrent connections. It can also be used to try lots of password against a http server. It is capable of using up to 1024 (or more using multiple processes). However with this amount it is capable or reducing internet connections to a crawl and also greatly increasing the load on the server.
a5d2da95b1cd1d0ba6fe4dd2c6679e8bf9b21070ccc3eee14c9f4eeffaa83726
This is a small MySQL cracking tool capable of running login attempts from multiple threads in parallel. It is capable of 1024 concurrent connections.
f146f20998994d92b163d14ad2d638e4e8fe1b472cee16e5eb3e73270024ebab
A small application built to test the performance of a pop3 authentication system using a lot of concurrent connections. It can also be used to try lots of password against a pop3 server. It is capable of using up to 1024 sessions (or more using multiple processes). However with this amount it is capable of reducing internet connections to a crawl and also greatly increasing the load on the server.
9656eba6276599aea703b4aa47b69f55bd69c00ef0b2c038630bff66db930ca5
Proof of concept WiFi cracking code for Guestek / Oneview systems as found in Extended Stay of America hotels.
2403e22ec2786784417aed238e2d1245788498cd2b5c9c1e8be22ee0466b44eb
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. When Medusa, Hydra or other brute-force tools fail to do what you want, Patator might be what you need.
04d67703d07d6304a50ace799e5784300b90ddaac6f446d3a216caa1d2e51e88
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
2f3c026f4e83d2c1d44cc5a1adfabd060b743b34f2ff02a6965241ca6bce9c87
The D-Link DSL-500T ADSL router suffers from cross site request forgery, brute force and predictable resource location vulnerabilities.
e1197c8518b708baebfcc89aaa6623dcba5d96a385f0f97bae7e527c4ce530bc
This is a perl script that generates a list of passwords from user-supplied input on the command line. It enables a tester the ability to create various permutations of a given password for testing.
1eb229f6f284423c21b8d973d32dc10130512598abb5cd7062d67dedcbc04955
oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. Linux and Windows binaries are included.
16202639d6c25483fc007261064759176b375ea82302ddc9fe653bef7541bc6e
oclHashcat-lite Advanced GPU hash cracking utility that includes the World's fastest MD4, MD5, SHA1, and SHA256 cracker. It supports up to 16 GPUs and include binaries for both Linux and Windows.
cf261e6057a91ef30d95d1869f6022f1ac3b75883a004f83c9d23dd5c09dc635
oclHashcat GPU hash cracking utility that has multi-GPU and multi-hash support. It supports dictionary-based and mask-attacks for hybrid cracking. Linux and Windows binaries are included.
fe094ffb3e721e9720c71df2777da4863813a3f3130e1e68a5c21baade226cc9
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
0d376320b6cc92b0f1341f4a06a79a989c9848e56da8018108b68c0dd6723e05
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
e81079682b5e39b9aae16bc3a3dfad5ee822067faf1af035d0087f9146c1cc71
THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
551ef1f72848dab19f6a1ff9fe31f08143c8cef26f638d93e7110b4bce49d0a4
This article will show how to use Hydra to check for weak passwords. Hydra tries all possible password combination against a server on the Internet until one valid one is found to log in to the server. It is a powerful tool for hackers and network administrators alike.
56171bc530902f8968a9598509262077fabc677e9035e86cc837313228edf75b
sshtrix is a very fast multithreaded SSH login cracker. It supports SSHv1 and SSHv2. sshtrix was designed to automate rapid bruteforce attacks against SSH authentification screens. Unlike other public tools, the aim is to keep it simple, stable, fast and modular. With its clean code design, it is easy to extend the code to a framework or to fork it against protocols of your choice.
dc90a8b2fbb62689d1b59333413b56a370a0715c38bf0792f517ed6f9763f5df
THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
a2457636b51f8a958bc092aafb7a59af57fa31e31d9b90211566247ac7cda33c
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
cd2ec7c7e2d178ab67e21097365bc72a0d202ffdcb27b4b6cdfe09b7ca9c2df3
sshtrix is a very fast multithreaded SSH login cracker. It supports SSHv1 and SSHv2. sshtrix was designed to automate rapid bruteforce attacks against SSH authentification screens. Unlike other public tools, the aim is to keep it simple, stable, fast and modular. With its clean code design, it is easy to extend the code to a framework or to fork it against protocols of your choice.
a7713e167574bf088eefff3eac46f566a65da838b0e35c3f696df6b68ae3c6c8
Text to Sorted with no repeated elements Word-List creator in Python 3.
ed3f96eb66a26256057cd2c883161345fa456f01e9adab6d68a5184c9d802dec
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.
ce780807899faf892b5b13af25d030a89ecf4b4e6e36f06d797b8812493541fd