Brute Force Software
TigerCrypt is a tool to encrypt / decrypt files. Highest security standards are used, e. g. 256 bit AES. The encrypted data is indistinguishable from random data. The password used for decryption cannot be verified. Whatever file is used for decryption, and whatever password is used, TigerCrypt...
Platforms: platform independent (Java VM 1.5+)
License: Freeware | Size: 1.33 MB | Download (394): TigerCrypt Download |
Accept / Deny incoming RDP connections by IP, Mac address, computer name and more 2X SecureRDP for Windows Terminal Services dramatically increases the security of your terminal servers by accepting or denying incoming RDP connections by IP, Mac address, computer name, client version or based on...
Platforms: Windows
License: Freeware | Size: 1.37 KB | Download (211): 2X SecureRDP for Terminal Services Download |
PseudoQ is a Su Doku puzzles on your computer. PseudoQ is a java application for creating, playing and solving Su Doku (a.k.a. number place) puzzles of various types. It features both GUI and command-line operation. The automatic solving of puzzles uses "smart" techniques rather than a brute...
Platforms: *nix
License: Freeware | Size: 1.4 MB | Download (90): PseudoQ Download |
sshutout is a daemon that periodically monitors log files, looking for multiple failed login attempts via the Secure Shell daemon. sshutout is meant to mitigate what are commonly known as "dictionary attacks," i.e. scripted brute force attacks that use lists of user IDs and passwords to effect...
Platforms: *nix
License: Freeware | Size: 30.72 KB | Download (94): sshutout Download |
combina is a password generator that uses three different algorithms based on combinatorial analysis. It implements the permutation without repetition, permutation with repetition (the famous brute force), and combination without repetition. combina project supports an unlimited number of...
Platforms: *nix
License: Freeware | Size: 67.58 KB | Download (126): combina Download |
Math::Numbers is a Perl module that contains methods for mathematical approaches of concepts of the number theory. SYNOPSIS use Math::Numbers; my $a = 123; my $b = 34; my $numbers = Math::Numbers->new($a, $b [, ...]); print "They are coprimes (relatively primes)!n" if...
Platforms: *nix
License: Freeware | Size: 4.1 KB | Download (98): Math::Numbers Download |
TCP Knocking provides a port knocking implementation. Often a secure system needs a port open so that only authorized persons can access a particular service and also the service should not exposed to attackers and worms that may use vulnerabilities that exist in the listening server. Port...
Platforms: *nix
License: Freeware | Size: 5.12 KB | Download (105): TCP Knocking Download |
BlockSSHD is a Perl script based on BruteForceBlocker v1.2.3 that dynamically adds IPTables rules for Linux and pf firewall rules for BSD that block SSH brute force attacks. It can also detect ProFTPd login failures. BlockSSHD checks a log file you specify, for example /var/log/secure on a Red...
Platforms: *nix
License: Freeware | Size: 10.24 KB | Download (96): BlockSSHD Download |
Kojoney project is a low level interaction honeypot that emulates an SSH server. The daemon is written in Python using the Twisted Conch libraries. Kojoney is a mix of the spanish word cojon (s/c/k/) and honey. In the spanish language the sentence "estar hasta los cojones" is used to express...
Platforms: *nix
License: Freeware | Size: 3.1 MB | Download (95): Kojoney Download |
BanFromLog is a shell script that examines your /var/log/auth.log and searches for the IP addresses of login attempts which use non-existent user names. BanFromLog is configured for use with sqlite or MySQL. Well is truth that if you have only an user, you dont need this but, when you have...
Platforms: *nix
License: Freeware | Size: 5.12 KB | Download (97): BanFromLog Download |
DJohn is a distributed John the Ripper.With Distributed John (DJohn) you can crack passwords using several machines to get passwords sooner than using a single machine. The cracking in itself is done by John The Ripper and djohns server (djohnd) divides the work in work packets and coordinates...
Platforms: *nix
License: Freeware | Size: 49.15 KB | Download (100): DJohn Download |
sud is a daemon to execute interactive and non-interactive processes with special (and customizable) privileges in a nosuid environment. Some advantages of the program are: you can switch to root privileges on a remote machine and keep its disks mounted with nosuid flag your client will be...
Platforms: *nix
License: Freeware | Size: 112.64 KB | Download (91): sud Download |
Sudoku Susser is a free program that helps you play Sudoku. If youve been living under a rock and dont know what a Sudoku puzzle is, the London Daily Mail has a good introduction to the puzzles and basic solving techniques. Sudoku Susser project makes it easy to make your selections as you...
Platforms: *nix
License: Freeware | Size: 2 MB | Download (105): Sudoku Susser Download |
PHAT is a browser-based network management solution with a heavy lean toward switches, routers, and other traffic handlers which can be used to control either a single node, subnet, or vlan. As you can probably see if youre reading this, PHAT is not the worlds most useful tool... yet. The...
Platforms: *nix
License: Freeware | Size: 235.52 KB | Download (98): PHAT Download |
Algorithm::Munkres is a Perl extension for Munkres solution to classical Assignment problem for square and rectangular matrices. This module extends the solution of Assignment problem for square matrices to rectangular matrices by padding zeros. Thus a rectangular matrix is converted to square...
Platforms: *nix
License: Freeware | Size: 9.22 KB | Download (100): Algorithm::Munkres Download |
Nuhe is a rule based log monitoring system, which is capable of action when rules are matched againsts log(s) activity. Default Nuhe mode is to run on background (daemon), but it can also be used in foreground and log analyzer mode. Log analyzer mode just analyzes given logs and prints results to...
Platforms: *nix
License: Freeware | Size: 112.64 KB | Download (92): Nuhe Download |
Xyzzy is a pronounceable password generator. It is useful for network or server administrators that find themselves creating new user accounts on a regular basis and need to come up with passwords for them.The reasons to use a pronounceable password generator such as xyzzy are simply because...
Platforms: Mac
License: Freeware | Download (126): Haxial xyzzy Download |
PINoptic Secured Storage uses the patented security access control called a One Time Visual Probablistic password (OTP) combined with industrial and military grade encryption to keep your private content private to you or those you choose to share your PINoptic Passcode with. Different types of...
Platforms: Windows
License: Freeware | Size: 1.3 MB | Download (115): PINoptic Secure Storage Download |
Armchair generals, unite! Defeat your enemy's army. The game gives you the opportunity to run your own war from the comfort of your home. Choose your virtual leader, either General Chaos or General Havoc, and get ready to exhibit your military mastery. There are more than 50 battlefields to fight...
Platforms: Windows
License: Freeware | Size: 1.03 MB | Download (52): General Chaos Download |
As the protector of the throne, it is your duty to punish those who disrespect the King. In the ultimate show of contempt, a group of traitors steal the Scepter of Order and begin terrorizing the entire kingdom. You play the role of the conqueror. You must assemble an army of Barbarians,...
Platforms: Windows
License: Freeware | Size: 798.72 KB | Download (56): King's Bounty Download |