password

Unveiling the Power of John the Ripper: A Password Cracking Tool

Passwords are the first line of defense for most computer systems and online accounts. A strong, complex password can help…

10 months ago

PXEThief : Extract Passwords From The Operating System Deployment Functionality

PXEThief is a set of tooling that implements attack paths discussed at the DEF CON 30 talk Pulling Passwords out…

1 year ago

Psudohash : Password List Generator That Focuses On Keywords Mutated By Commonly Used Password Creation Patterns

psudohash is a password list generator for orchestrating brute force attacks. It imitates certain password creation patterns commonly used by…

2 years ago

SSOh-No : User Enumeration And Password Spraying Tool For Testing Azure AD

SSOh-No is designed to enumerate users, password spray and perform brute force attacks against any organisation that utilises Azure AD…

2 years ago

Spraygen : Password List Generator For Password Spraying

Spraygen is a password list generator for password spraying - prebaked with goodies. Version 1.5 Generates permutations of Months, Seasons,…

3 years ago

Depix : Recovers Passwords From Pixelized Screenshots

Depix is a tool for recovering passwords from pixelized screenshots. This implementation works on pixelized images that were created with…

3 years ago

Trident : Automated Password Spraying Tool

The Trident project is an automated password spraying tool developed to meet the following requirements: The ability to be deployed…

3 years ago

PwnedPasswordsChecker : Tool To Check Hash Of Password

PwnedPasswordsChecker is a tool that checks if the hash of a known password (in SHA1 or NTLM format) is present…

4 years ago

EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail + Password

Emagnet is a very powerful tool for it's purpose which is to capture email addresses and passwords from leaked databases…

5 years ago

Zydra : Password Recovery Tool & Linux Shadow File Cracker

Zydra is a file password recovery tool and Linux shadow file cracker. It uses the dictionary search or Brute force…

5 years ago