Category: Password Attacks

Crack linux passwords using John the Ripper

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), Windows, DOS, BeOS, and OpenVMS (the latter requires a contributed patch)....

Johnny – GUI for John the Ripper

Johnny is the cross-platform Open Source GUI frontend for the popular password cracker John the Ripper. It was originally proposed and designed by Shinnok in draft, version 1.0 implementation was achieved by Aleksey Cherepanov...

joffrey: stupid MQTT brute forcer

What is MQTT? MQTT stands for MQ Telemetry Transport. It is a publish/subscribe, extremely simple and lightweight messaging protocol, designed for constrained devices and low-bandwidth, high-latency or unreliable networks. The design principles are to...

WMD | Python framework for IT security tools

Weapon of Mass Destruction This is a python tool with a collection of IT security software. The software is incapsulated in “modules”. The modules does consist of pure python code and/or external third programs....

FileVaultCracker: macOS FileVault cracking tool

Today, we are introduced for a macOS FileVault disk file protection function of the password crack tool, the tool is easy to use. Introduction to FileVault In fact, FileVault should be regarded as a security...

BEWGor: Bull’s Eye Wordlist Generator

What does BEWGor do? At its core, BEWGor is designed help with ensuring password security. It is a Python script that prompts the user for biographical data about a person (called the Subject), which...

myBFF

myBFF: a Brute Force Framework

myBFF is a web application brute force framework. Point the framework at a file containing usernames, a host, and give it a password. The framework will determine what type of web application is in...

Crack MD5, SHA1, MySQL, NTLM Free Online!

Some time ago came md5online search engine mass, free and online hashes where you can find up to 25,000 hashes in a batch. Automatically detects the hash you are looking for and find most of...

Top 3 best brute force attack tools

A password and cryptography attack that does not attempt to decrypt any information, but continue to try a list of different passwords, words, or letters. For example, a simple brute-force attack may have a...