Bruke Force Attacks
Brute Force Shell uses PHP (and some ShellScript) to protect your linux server against bruke force attacks. It also keeps a log in a MySQL database and have an email reporting system.
Platforms: Windows, Mac, *nix, PHP, BSD Solaris
License: Freeware | Download (68): Brute Force Shell Download |
sshdfilter automatically blocks ssh brute force attacks by reading sshd log output in real time and adding iptables rules based on authentication failures. Block rules are created by logging on with an invalid user name, or wrongly guessing the password for an existing account. Block rules...
Platforms: *nix
License: Freeware | Size: 17.41 KB | Download (111): sshdfilter Download |
Sshguard protects networked hosts from the todays widespread brute force attacks against ssh servers. It detects such attacks and blocks the authors address with a firewall rule. This project is BSD licensed. How sshguard works Sshguard monitors ssh servers from their logging activity. It...
Platforms: *nix
License: Freeware | Size: 419.84 KB | Download (96): Sshguard 1.1 Beta Download |
PeecFW is a PHP Framework, and with it's built in modules and templates you actually have a nice and feature specific CMS (Content Management System). PeecFW is free and open source under the General Public License V3.Your CMS:PeecFW's powerful features let's you create your CMS easy and simple....
Platforms: PHP
License: Freeware | Size: 22.25 MB | Download (44): PeecFW Download |
Default Wordpress installation is vulnerable to brute force and dictionary attacks, because there is no limit how many times user can use invalid password before finding the correct one. This plugin closes this security hole by introducing maximum number of invalid login attempts. When someone...
Platforms: PHP
License: Freeware | Size: 102.4 KB | Download (53): User Locker Download |
BanFromLog is a shell script that examines your /var/log/auth.log and searches for the IP addresses of login attempts which use non-existent user names. BanFromLog is configured for use with sqlite or MySQL. Well is truth that if you have only an user, you dont need this but, when you have...
Platforms: *nix
License: Freeware | Size: 5.12 KB | Download (97): BanFromLog Download |
Password auditing and recovery tool for Windows NT/2000/XP/2003.
Accounts information import: import from local computer, import from remote computer, import from SAM file, import from .LC file, import from .LCS file, import from PwDump file, import from Sniff file.
Passwords recovering by...
Platforms: Windows
License: Freeware | Size: 2.29 MB | Download (2445): LCP Download |
sshutout is a daemon that periodically monitors log files, looking for multiple failed login attempts via the Secure Shell daemon. sshutout is meant to mitigate what are commonly known as "dictionary attacks," i.e. scripted brute force attacks that use lists of user IDs and passwords to effect...
Platforms: *nix
License: Freeware | Size: 30.72 KB | Download (94): sshutout Download |
smspasswd software provides two factor authentication via cell phone short message service (SMS). The reason I wrote this was because of all the pesky SSH brute force attacks, which continue to build in numbers. I didn’t want to waste money and time on using tokens because the few people who...
Platforms: *nix
License: Freeware | Size: 4.1 KB | Download (110): smspasswd Download |
TCP Knocking provides a port knocking implementation. Often a secure system needs a port open so that only authorized persons can access a particular service and also the service should not exposed to attackers and worms that may use vulnerabilities that exist in the listening server. Port...
Platforms: *nix
License: Freeware | Size: 5.12 KB | Download (105): TCP Knocking Download |
BlockSSHD is a Perl script based on BruteForceBlocker v1.2.3 that dynamically adds IPTables rules for Linux and pf firewall rules for BSD that block SSH brute force attacks. It can also detect ProFTPd login failures. BlockSSHD checks a log file you specify, for example /var/log/secure on a Red...
Platforms: *nix
License: Freeware | Size: 10.24 KB | Download (96): BlockSSHD Download |
Nuhe is a rule based log monitoring system, which is capable of action when rules are matched againsts log(s) activity. Default Nuhe mode is to run on background (daemon), but it can also be used in foreground and log analyzer mode. Log analyzer mode just analyzes given logs and prints results to...
Platforms: *nix
License: Freeware | Size: 112.64 KB | Download (92): Nuhe Download |
PINoptic Secured Storage uses the patented security access control called a One Time Visual Probablistic password (OTP) combined with industrial and military grade encryption to keep your private content private to you or those you choose to share your PINoptic Passcode with. Different types of...
Platforms: Windows
License: Freeware | Size: 1.3 MB | Download (115): PINoptic Secure Storage Download |
Crimson512 is the ultimate file encryption system. It is fast, easy-to-use and completely secure even from brute-force attacks. Protect your files from prying eyes with confidence.
Crimson512 uses single license system that allows any number of installations using the same license key. With...
Platforms: Windows
License: Freeware | Download (423): Crimson512 QuadCore Download |
PowerPoint Password is a password recovery tool, which comes in very handy if you lost or forgot your password for PowerPoint presentations (*.ppt, *.pps files). Such a situation might occur if someone who does not work with you anymore password protected some vital information that is absolutely...
Platforms: Windows
License: Freeware | Size: 706.56 KB | Download (442): LastBit PowerPoint Password Recovery Download |
Recover password protected documents created in all versions of Microsoft Word, including the latest Word 2007. LastBit Word Password Recovery instantly recovers Word 2003 and earlier documents, and allows advanced attacks to recover Word 2007 passwords. LastBit Word Password Recovery makes it...
Platforms: Windows
License: Freeware | Size: 2.4 MB | Download (442): LastBit Word Password Recovery Download |
Java based API and commandline utility for cross-platform file encryption and archivation (up to 2,1 GB). Uses Twofish and SHA-256 *** due to current design error FHL has a weakness to brute force attacks and usage is deprecated!! ***
Platforms: Windows, Mac, Linux
License: Freeware | Size: 201.18 KB | Download (49): FileHashler Download |
HTTPBrute is used to calculate HTTP Digest Access Authentication as per RFC 2617. The tool will be able to perform brute force attacks to retrieve a lost password for a given Authentication response. MD5 is the only hashing algorithm implemented.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 122.66 KB | Download (53): HTTPBrute Download |
This tool is a lightweight, fast and reliable Sendmail filter that implements a real-time Sender e-Mail Address Verification technology. This technology can stop some kinds of SPAM with a spoofed sender's e-Mail address. Also it implements a real-time Recipient e-Mail Address Verification...
Platforms: *nix, C/C++, BSD
License: Freeware | Download (55): Sendmail Sender Address Validator Download |
Free Password Strength Meter checks the level of strength of your passwords. It uses information entropy as a measure of strength and reliability. Free Password Strength Meter checks and displays the strength of your passwords, in bits of entropy. It also shows you the level of password strength...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 550 KB | Download (60): Free Password Strength Meter Download |