Monday, December 16, 2019

Password Attacks

Password Attacks Tools

Password Attacks

Home Password Attacks
Password Attacks Tools
hydra

Online Password Bruteforce with Hydra-GTK

Hydra (better known as "thc-hydra") is an online password attack tool. It brute forces various combinations on live services like...
John The Ripper

John The Ripper – One Stop Password Audit Tool

John The Ripper - A one stop password audit tool for various formats John is a state of the art offline...

Johnny

Lab 2: Test the complexity of a Windows System, Cracking Windows hashes using Johnny When cracking Windows passwords if LM hashing...

Must Need

Lst2x64dbg : Extract Labels From IDA .lst or Ghidra .csv File & Export x64dbg Database

Lst2x64dbg : Extract Labels From IDA .lst or Ghidra .csv File...

lst2x64dbg script extracts all the labels found in the LST file that is given as the script's single argument. An x64dbg...

Johnny

Lab 2: Test the complexity of a Windows System, Cracking Windows hashes using Johnny When cracking Windows passwords if LM hashing is not disabled, two...
Thc Hydra : Tool To Gain Unauthorised Access From Remote To A System

Thc Hydra : Tool To Gain Unauthorised Access From Remote To...

Number one of the biggest security holes are passwords, as every password security study shows. Thc Hydra is a proof of concept...
KBD-Audio

KBD-Audio : Tools For Capturing & Analysing Keyboard Input Paired With...

KBD-Audio is a collection of command-line and GUI tools for capturing and analyzing audio data. The most interesting tool is called keytap - it...
Remote-Desktop-Caching

Remote Desktop Caching : Tool To Recover Old RDP

Remote Desktop Caching tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. It is extremely useful...
0xsp Mongoose : Privilege Escalation Enumeration Toolkit (64/32 )

0xsp Mongoose : Privilege Escalation Enumeration Toolkit (64/32 )

Using 0xsp mongoose you will be able to scan targeted operating system for any possible way for privilege escalation attacks,starting from collecting...
Python Uncompyle6 – A Cross-Version Python Bytecode Decompiler

Python Uncompyle6 – A Cross-Version Python Bytecode Decompiler

Uncompyle6 translates Python bytecode back into equivalent Python source code. It accepts bytecodes from Python version 1.3 to version 3.8, spanning over...