Brute Force Em Sites
Blaster Scan is a TCP port scanner. It can extract users exploiting vrfy or expn, check anonymous access on FTP, check brute force on FTP and POP3, extract daemons' versions, and scan for CGI bugs. It also has a SYN port scan, the ability to ping hosts t
|License: Freeware||Size: 81.92 KB||Download (18): Blaster Scanner Download|
Use SESAMI Mobile One Time Password to access Web sites and networks or to digitally sign transactions in a highly secure and user-friendly way. CIDWAY SESAMI Mobile One-Time-Password (OTP) mobile application provides a time based 2-factor authentication solution for any remote access,...
Platforms: Windows Phone
|License: Freeware||Size: 1024 KB||Download (7): Sesami Download|
Private! makes it possible to build private blogs for your friends, family or your business. You can also use it to protect paid content on your page. The configuration is as simple as powerful and the best of all: It's incredible fast - you will not notice any differences from your standard...
|License: Freeware||Size: 10 KB||Download (19): Private! WordPress Access Control Manager Download|
The Egglue CAPTCHA module uses the Egglue Semantic CAPTCHA web service for generating over 10,000 knowledge-based, accessible CAPTCHA challenges on a Drupal site. The CAPTCHA module is required.For the example CAPTCHA challenges, correct responses can be 'spread' and 'play' or 'cut' and...
|License: Freeware||Size: 10 KB||Download (18): Egglue CAPTCHA Download|
Deltacrypt OneClick Public Key File and Email Encryption Software application featuring RSA protection in its public keys, encryption and public key integrity protection with hashing functions and digital signatures. Deltacrypt OneClick lets the user create and distribute public keys. Its...
|License: Freeware||Size: 1000 KB||Download (355): Deltacrypt OneClick Encryption Software Download|
Get 1,000,000 100% effective email addresses in 24 hours.multi email domain serach
Email Finder helps get 100% effective email addresses directly from smtp Server.
Support multi email domain serach and multi-threads!
Speciality! support serach more than one email domain at one time!...
|License: Freeware||Download (4304): arcai.com's email finder Download|
PicoZip Recovery Tool is an easy-to-use program that can help you recover lost or forgotten passwords from password protected Zip files created by compression utilities like PicoZip, WinZip, PKZip, etc. Self-extracting Zip files are also supported. You have a choice of Brute Force or Dictionary...
|License: Freeware||Size: 2.73 MB||Download (5920): PicoZip Recovery Tool Download|
TurboEncoder is an easy to use file encryptor which guarantees maximun security.
It features a friendly user interface, with in program HTML messages to assist you even in case of error. Help is included with the program.
TurboEncoder has been protected against software cracking and brute force...
|License: Freeware||Size: 204 KB||Download (304): TurboEncoder Download|
Password auditing and recovery tool for Windows NT/2000/XP/2003.
Accounts information import: import from local computer, import from remote computer, import from SAM file, import from .LC file, import from .LCS file, import from PwDump file, import from Sniff file.
Passwords recovering by...
|License: Freeware||Size: 2.29 MB||Download (2417): LCP Download|
The AirGrab Password allows you to create random passwords that are highly secure and extremely difficult to crack or guess due to an optional combination of lower and upper case letters, numbers and other symbols. Generate strong passwords by one click for access points, WEP and WPA encryption...
|License: Freeware||Size: 2.81 MB||Download (259): AirGrab Password Download|
Carnage Blender is a free multiplayer online role-playing game. The main purpose of the game is to kill the other players, using whatever strategies suit you best. Gain your fame and fortune by fighting your way up the player rankings using brute force, powerful magical spells, or clever...
|License: Freeware||Size: 169 KB||Download (127): Carnage Blender Download|
TigerCrypt is a tool to encrypt / decrypt files. Highest security standards are used, e. g. 256 bit AES. The encrypted data is indistinguishable from random data. The password used for decryption cannot be verified. Whatever file is used for decryption, and whatever password is used, TigerCrypt...
Platforms: platform independent (Java VM 1.5+)
|License: Freeware||Size: 1.33 MB||Download (372): TigerCrypt Download|
Accept / Deny incoming RDP connections by IP, Mac address, computer name and more 2X SecureRDP for Windows Terminal Services dramatically increases the security of your terminal servers by accepting or denying incoming RDP connections by IP, Mac address, computer name, client version or based on...
|License: Freeware||Size: 1.37 KB||Download (187): 2X SecureRDP for Terminal Services Download|
Isanaki is a free Sudoku and Wordoku Boards generator, solver and helper. The software supports 9 * 9 and 16 * 16 boards and generate boards with 6 levels of difficulty.Freeware garanteed without spyware.
* the software supports 9*9 and 16*16 boards
* the software handles...
|License: Freeware||Size: 1.05 MB||Download (183): Isanaki Download|
PseudoQ is a Su Doku puzzles on your computer. PseudoQ is a java application for creating, playing and solving Su Doku (a.k.a. number place) puzzles of various types. It features both GUI and command-line operation. The automatic solving of puzzles uses "smart" techniques rather than a brute...
|License: Freeware||Size: 1.4 MB||Download (73): PseudoQ Download|
sshutout is a daemon that periodically monitors log files, looking for multiple failed login attempts via the Secure Shell daemon. sshutout is meant to mitigate what are commonly known as "dictionary attacks," i.e. scripted brute force attacks that use lists of user IDs and passwords to effect...
|License: Freeware||Size: 30.72 KB||Download (77): sshutout Download|
Find IPs of crackers and kiddies attempting to break in. Creates iptables rules to block attackers IPs for a specified period of time. It works by using handlers which are created to watch for attacks against a given service, such as ssh, telnet, ftp, etc. The handlers can be enabled or...
|License: Freeware||Size: 45.06 KB||Download (77): Daemon Shield Download|
combina is a password generator that uses three different algorithms based on combinatorial analysis. It implements the permutation without repetition, permutation with repetition (the famous brute force), and combination without repetition. combina project supports an unlimited number of...
|License: Freeware||Size: 67.58 KB||Download (107): combina Download|
Math::Numbers is a Perl module that contains methods for mathematical approaches of concepts of the number theory. SYNOPSIS use Math::Numbers; my $a = 123; my $b = 34; my $numbers = Math::Numbers->new($a, $b [, ...]); print "They are coprimes (relatively primes)!n" if...
|License: Freeware||Size: 4.1 KB||Download (80): Math::Numbers Download|
smspasswd software provides two factor authentication via cell phone short message service (SMS). The reason I wrote this was because of all the pesky SSH brute force attacks, which continue to build in numbers. I didn’t want to waste money and time on using tokens because the few people...
|License: Freeware||Size: 4.1 KB||Download (87): smspasswd Download|