Brute Force Evo Ii Typo Find Software
Small Utilities is an easy yet powerful suite of utilities ranging from system utilities to cryptography, numerical and date/time calculation process automation by batch or script.
Small Utilities consists of the following tools:
ยท AddPath - Add or remove path to the %PATH% variable. With this...
Platforms: Windows, XP, 2003, Windows Vista, 2008, 7, 7x64
License: Freeware | Download (457): Small Utilities Download |
Appnimi Word Password Recovery is designed to let you search for passwords of protected Word documents. This program guarantees the most complicated Word passwords recovery. Appnimi Word Password Recovery allows to search for the password of the protected Word using Brute Force algorithm.
It...
Platforms: Windows, Windows 8, Windows 7
License: Freeware | Size: 2.65 MB | Download (101): Appnimi Word Password Recovery Download |
The program is completely free, easy, fast and powerful. It is the best way to encode and decode any type of file, which also integrates seamlessly into Windows Explorer.
Be used to hide all the sensitive data and important that we want to keep away from prying eyes.
Here are the features:...
Platforms: Windows, Windows 7, Windows Server, Other
License: Freeware | Size: 2.85 MB | Download (52): Encoding Decoding Free Download |
Sicurpas a freeware tool for complete safety.
Sicurpas Freeware 4.0 Professional is a powerful and complete tool to protect your passwords and your most sensitive data. Designed in Sardinia Mariano and Pierluigi Ortu in collaboration with Daniel Deriu, this software uses three of the most...
Platforms: Windows
License: Freeware | Size: 5.72 MB | Download (76): Sicurpas Freeware professional Download |
Computes BER v EbNo curve for convolutional encoding / soft decision Viterbi decoding scheme assuming BPSK.Brute force Monte Carlo approach is unsatisfactory (takes too long) to find the BER curve.The computation uses a quasi-analytic (QA) technique that relies on the estimation (approximate one)...
Platforms: Matlab
License: Freeware | Size: 10 KB | Download (38): Impact of quantization on performance Download |
Appnimi PDF Unlocker is designed to let you search for passwords of protected PDF documents. This program guarantees the most complicated PDF passwords recovery. Appnimi PDF Unlocker allows to search for the password of the protected PDF using Brute Force algorithm. It can be used by both a...
Platforms: Windows, Windows 8, Windows 7
License: Freeware | Size: 3.17 MB | Download (68): Appnimi PDF Unlocker Download |
PicoZip Recovery Tool is an easy-to-use program that can help you recover lost or forgotten passwords from password protected Zip files created by compression utilities like PicoZip, WinZip, PKZip, etc. Self-extracting Zip files are also supported. You have a choice of Brute Force or Dictionary...
Platforms: Windows
License: Freeware | Size: 2.73 MB | Download (5972): PicoZip Recovery Tool Download |
Password auditing and recovery tool for Windows NT/2000/XP/2003.
Accounts information import: import from local computer, import from remote computer, import from SAM file, import from .LC file, import from .LCS file, import from PwDump file, import from Sniff file.
Passwords recovering by...
Platforms: Windows
License: Freeware | Size: 2.29 MB | Download (2445): LCP Download |
The AirGrab Password allows you to create random passwords that are highly secure and extremely difficult to crack or guess due to an optional combination of lower and upper case letters, numbers and other symbols. Generate strong passwords by one click for access points, WEP and WPA encryption...
Platforms: Mac
License: Freeware | Size: 2.81 MB | Download (284): AirGrab Password Download |
TigerCrypt is a tool to encrypt / decrypt files. Highest security standards are used, e. g. 256 bit AES. The encrypted data is indistinguishable from random data. The password used for decryption cannot be verified. Whatever file is used for decryption, and whatever password is used, TigerCrypt...
Platforms: platform independent (Java VM 1.5+)
License: Freeware | Size: 1.33 MB | Download (394): TigerCrypt Download |
Accept / Deny incoming RDP connections by IP, Mac address, computer name and more 2X SecureRDP for Windows Terminal Services dramatically increases the security of your terminal servers by accepting or denying incoming RDP connections by IP, Mac address, computer name, client version or based on...
Platforms: Windows
License: Freeware | Size: 1.37 KB | Download (211): 2X SecureRDP for Terminal Services Download |
PseudoQ is a Su Doku puzzles on your computer. PseudoQ is a java application for creating, playing and solving Su Doku (a.k.a. number place) puzzles of various types. It features both GUI and command-line operation. The automatic solving of puzzles uses "smart" techniques rather than a brute...
Platforms: *nix
License: Freeware | Size: 1.4 MB | Download (90): PseudoQ Download |
sshutout is a daemon that periodically monitors log files, looking for multiple failed login attempts via the Secure Shell daemon. sshutout is meant to mitigate what are commonly known as "dictionary attacks," i.e. scripted brute force attacks that use lists of user IDs and passwords to effect...
Platforms: *nix
License: Freeware | Size: 30.72 KB | Download (94): sshutout Download |
combina is a password generator that uses three different algorithms based on combinatorial analysis. It implements the permutation without repetition, permutation with repetition (the famous brute force), and combination without repetition. combina project supports an unlimited number of...
Platforms: *nix
License: Freeware | Size: 67.58 KB | Download (126): combina Download |
Math::Numbers is a Perl module that contains methods for mathematical approaches of concepts of the number theory. SYNOPSIS use Math::Numbers; my $a = 123; my $b = 34; my $numbers = Math::Numbers->new($a, $b [, ...]); print "They are coprimes (relatively primes)!n" if...
Platforms: *nix
License: Freeware | Size: 4.1 KB | Download (104): Math::Numbers Download |
The tovid suite is a collection of several components, each specialized for a certain task. All suite components are written in plain-text scripting languages, making modification and patching relatively easy. The suite is released under the GNU General Public License. tovid was born in May...
Platforms: *nix
License: Freeware | Size: 399.36 KB | Download (99): tovid Download |
TCP Knocking provides a port knocking implementation. Often a secure system needs a port open so that only authorized persons can access a particular service and also the service should not exposed to attackers and worms that may use vulnerabilities that exist in the listening server. Port...
Platforms: *nix
License: Freeware | Size: 5.12 KB | Download (105): TCP Knocking Download |
BlockSSHD is a Perl script based on BruteForceBlocker v1.2.3 that dynamically adds IPTables rules for Linux and pf firewall rules for BSD that block SSH brute force attacks. It can also detect ProFTPd login failures. BlockSSHD checks a log file you specify, for example /var/log/secure on a Red...
Platforms: *nix
License: Freeware | Size: 10.24 KB | Download (96): BlockSSHD Download |
Kojoney project is a low level interaction honeypot that emulates an SSH server. The daemon is written in Python using the Twisted Conch libraries. Kojoney is a mix of the spanish word cojon (s/c/k/) and honey. In the spanish language the sentence "estar hasta los cojones" is used to express...
Platforms: *nix
License: Freeware | Size: 3.1 MB | Download (95): Kojoney Download |
BanFromLog is a shell script that examines your /var/log/auth.log and searches for the IP addresses of login attempts which use non-existent user names. BanFromLog is configured for use with sqlite or MySQL. Well is truth that if you have only an user, you dont need this but, when you have...
Platforms: *nix
License: Freeware | Size: 5.12 KB | Download (97): BanFromLog Download |