Download Shareware and Freeware Software for Windows, Linux, Macintosh, PDA

line Home  |  About Us  |  Link To Us  |  FAQ  |  Contact

Serving Software Downloads in 956 Categories, Downloaded 50.154.686 Times

Brute Force Software freeware
Filter: All | Freeware | Demo
 

Brute Force Software

< 1 2 3 4 5 > 
Added: August 05, 2008 | Visits: 1.487

TigerCrypt TigerCrypt is a tool to encrypt / decrypt files. Highest security standards are used, e. g. 256 bit AES. The encrypted data is indistinguishable from random data. The password used for decryption cannot be verified. Whatever file is used for decryption, and whatever password is used, TigerCrypt...



Platforms: platform independent (Java VM 1.5+)

License: Freeware Size: 1.33 MB Download (394): TigerCrypt Download

Added: August 04, 2008 | Visits: 3.358

2X SecureRDP for Terminal Services Accept / Deny incoming RDP connections by IP, Mac address, computer name and more 2X SecureRDP for Windows Terminal Services dramatically increases the security of your terminal servers by accepting or denying incoming RDP connections by IP, Mac address, computer name, client version or based on...





Platforms: Windows

License: Freeware Size: 1.37 KB Download (211): 2X SecureRDP for Terminal Services Download

Added: February 23, 2010 | Visits: 775

PseudoQ PseudoQ is a Su Doku puzzles on your computer. PseudoQ is a java application for creating, playing and solving Su Doku (a.k.a. number place) puzzles of various types. It features both GUI and command-line operation. The automatic solving of puzzles uses "smart" techniques rather than a brute...


Platforms: *nix

License: Freeware Size: 1.4 MB Download (90): PseudoQ Download

Added: April 01, 2010 | Visits: 1.049

sshutout sshutout is a daemon that periodically monitors log files, looking for multiple failed login attempts via the Secure Shell daemon. sshutout is meant to mitigate what are commonly known as "dictionary attacks," i.e. scripted brute force attacks that use lists of user IDs and passwords to effect...


Platforms: *nix

License: Freeware Size: 30.72 KB Download (94): sshutout Download

Added: February 18, 2010 | Visits: 787

combina combina is a password generator that uses three different algorithms based on combinatorial analysis. It implements the permutation without repetition, permutation with repetition (the famous brute force), and combination without repetition. combina project supports an unlimited number of...


Platforms: *nix

License: Freeware Size: 67.58 KB Download (126): combina Download

Added: September 13, 2010 | Visits: 1.197

Math::Numbers Math::Numbers is a Perl module that contains methods for mathematical approaches of concepts of the number theory. SYNOPSIS use Math::Numbers; my $a = 123; my $b = 34; my $numbers = Math::Numbers->new($a, $b [, ...]); print "They are coprimes (relatively primes)!n" if...


Platforms: *nix

License: Freeware Size: 4.1 KB Download (98): Math::Numbers Download

Added: June 12, 2010 | Visits: 1.071

TCP Knocking TCP Knocking provides a port knocking implementation. Often a secure system needs a port open so that only authorized persons can access a particular service and also the service should not exposed to attackers and worms that may use vulnerabilities that exist in the listening server. Port...


Platforms: *nix

License: Freeware Size: 5.12 KB Download (105): TCP Knocking Download

Added: October 18, 2013 | Visits: 727

BlockSSHD BlockSSHD is a Perl script based on BruteForceBlocker v1.2.3 that dynamically adds IPTables rules for Linux and pf firewall rules for BSD that block SSH brute force attacks. It can also detect ProFTPd login failures. BlockSSHD checks a log file you specify, for example /var/log/secure on a Red...


Platforms: *nix

License: Freeware Size: 10.24 KB Download (96): BlockSSHD Download

Added: March 26, 2010 | Visits: 1.329

Kojoney Kojoney project is a low level interaction honeypot that emulates an SSH server. The daemon is written in Python using the Twisted Conch libraries. Kojoney is a mix of the spanish word cojon (s/c/k/) and honey. In the spanish language the sentence "estar hasta los cojones" is used to express...


Platforms: *nix

License: Freeware Size: 3.1 MB Download (95): Kojoney Download

Added: July 03, 2010 | Visits: 930

BanFromLog BanFromLog is a shell script that examines your /var/log/auth.log and searches for the IP addresses of login attempts which use non-existent user names. BanFromLog is configured for use with sqlite or MySQL. Well is truth that if you have only an user, you dont need this but, when you have...


Platforms: *nix

License: Freeware Size: 5.12 KB Download (97): BanFromLog Download

Added: September 01, 2010 | Visits: 988

DJohn DJohn is a distributed John the Ripper.With Distributed John (DJohn) you can crack passwords using several machines to get passwords sooner than using a single machine. The cracking in itself is done by John The Ripper and djohns server (djohnd) divides the work in work packets and coordinates...


Platforms: *nix

License: Freeware Size: 49.15 KB Download (100): DJohn Download

Added: February 18, 2010 | Visits: 785

sud sud is a daemon to execute interactive and non-interactive processes with special (and customizable) privileges in a nosuid environment. Some advantages of the program are: you can switch to root privileges on a remote machine and keep its disks mounted with nosuid flag your client will be...


Platforms: *nix

License: Freeware Size: 112.64 KB Download (91): sud Download

Added: October 21, 2010 | Visits: 1.142

Sudoku Susser Sudoku Susser is a free program that helps you play Sudoku. If youve been living under a rock and dont know what a Sudoku puzzle is, the London Daily Mail has a good introduction to the puzzles and basic solving techniques. Sudoku Susser project makes it easy to make your selections as you...


Platforms: *nix

License: Freeware Size: 2 MB Download (105): Sudoku Susser Download

Added: April 18, 2010 | Visits: 981

PHAT PHAT is a browser-based network management solution with a heavy lean toward switches, routers, and other traffic handlers which can be used to control either a single node, subnet, or vlan. As you can probably see if youre reading this, PHAT is not the worlds most useful tool... yet. The...


Platforms: *nix

License: Freeware Size: 235.52 KB Download (98): PHAT Download

Added: November 04, 2010 | Visits: 940

Algorithm::Munkres Algorithm::Munkres is a Perl extension for Munkres solution to classical Assignment problem for square and rectangular matrices. This module extends the solution of Assignment problem for square matrices to rectangular matrices by padding zeros. Thus a rectangular matrix is converted to square...


Platforms: *nix

License: Freeware Size: 9.22 KB Download (100): Algorithm::Munkres Download

Added: January 09, 2010 | Visits: 1.303

Nuhe Nuhe is a rule based log monitoring system, which is capable of action when rules are matched againsts log(s) activity. Default Nuhe mode is to run on background (daemon), but it can also be used in foreground and log analyzer mode. Log analyzer mode just analyzes given logs and prints results to...


Platforms: *nix

License: Freeware Size: 112.64 KB Download (92): Nuhe Download

Added: January 25, 2010 | Visits: 618

Haxial xyzzy Xyzzy is a pronounceable password generator. It is useful for network or server administrators that find themselves creating new user accounts on a regular basis and need to come up with passwords for them.The reasons to use a pronounceable password generator such as xyzzy are simply because...


Platforms: Mac

License: Freeware Download (126): Haxial xyzzy Download

Released: December 01, 2009  |  Added: May 15, 2010 | Visits: 871

PINoptic Secure Storage PINoptic Secured Storage uses the patented security access control called a One Time Visual Probablistic password (OTP) combined with industrial and military grade encryption to keep your private content private to you or those you choose to share your PINoptic Passcode with. Different types of...


Platforms: Windows

License: Freeware Size: 1.3 MB Download (115): PINoptic Secure Storage Download

Released: August 11, 2012  |  Added: August 11, 2012 | Visits: 464

General Chaos Armchair generals, unite! Defeat your enemy's army. The game gives you the opportunity to run your own war from the comfort of your home. Choose your virtual leader, either General Chaos or General Havoc, and get ready to exhibit your military mastery. There are more than 50 battlefields to fight...


Platforms: Windows

License: Freeware Size: 1.03 MB Download (52): General Chaos Download

Released: October 08, 2012  |  Added: October 08, 2012 | Visits: 482

King's Bounty As the protector of the throne, it is your duty to punish those who disrespect the King. In the ultimate show of contempt, a group of traitors steal the Scepter of Order and begin terrorizing the entire kingdom. You play the role of the conqueror. You must assemble an army of Barbarians,...


Platforms: Windows

License: Freeware Size: 798.72 KB Download (56): King's Bounty Download

< 1 2 3 4 5 >