Jump to content

Search the Community

Showing results for tags 'brute-force'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 9 results

  1. A simple tool to work with Metamask logs Accepts logs only in folders Parser of seed phrases and passwordsBrute force wallets to which passwords from the log did not fit Generation of dictionaries for brute force based on passwords collected from previously checked logs Possibility to choose your own vocabulary for brute force Open config.json In the first line specify the path to the dictionary that you have (already available in the folder with the checker) in the second line specify the number of threads In the third line specify whether to delete empty logs In the fourth, specify the path to the .txt file where the autogenerated dictionary will be written Run metamask-brute.exe Paste the path to the folder where the archives with logs are located or simply drag and drop this folder into the console application (the path will be determined by itself) Press Enter [hide][Hidden Content]]
  2. Motivation During the forensic analysis of a Windows machine, you may find the name of a deleted prefetch file. While its content may not be recoverable, the filename itself is often enough to find the full path of the executable for which the prefetch file was created. [hide][Hidden Content]]
  3. Prefetch Hash Cracker During the forensic analysis of a Windows machine, you may find the name of a deleted prefetch file. While its content may not be recoverable, the filename itself is often enough to find the full path of the executable for which the prefetch file was created. How does it work? The provided bodyfile is used to get the path of every folder on the volume. The tool appends the provided executable name to each of those paths to create a list of possible full paths for the executable. Each possible full path is then hashed using the provided hash function. If there’s a possible full path for which the result matches the provided hash, that path is outputted. [Hidden Content]
  4. Kraken: A multi-platform distributed brute-force password cracking system. What is Kraken Kraken is an online distributed brute force password cracking tool. It allows you to parallelize dictionaries and crunch word generator-based cracking across multiple machines both as a web app in a web browser and as a standalone electron-based client. Kraken aims to be easy to use, fault-tolerant and scalable. I wrote Kraken because I wanted to learn more about offensive security and to write an easy solution to overcome the limitation of using a single device when attempting to distribute brute force workloads. [hide][Hidden Content]]
  5. Kraker Kraker is a distributed password brute-force system that allows you to run and manage the hashcat on different servers and workstations, focused on easy of use. There were two main goals during the design and development: to create the most simple tool for distributed hash cracking and make it fault-tolerant. Kraker consists of two main components – a server and an agent, which communicate through a REST API. You can read about their installation and configuration below. Kraker continues to be in development, so the new functionality, documentation, and updates will be released as they become available. Changelog v1.2 Fixed: Mur-mur-hash instead of MD5. [hide][Hidden Content]]
  6. Kraker is a distributed password brute-force system that allows you to run and manage the hashcat on different servers and workstations, focused on easy of use. There were two main goals during the design and development: to create the most simple tool for distributed hash cracking and make it fault-tolerant. Kraker consists of two main components – a server and an agent, which communicate through a REST API. You can read about their installation and configuration below. Kraker continues to be in development, so the new functionality, documentation, and updates will be released as they become available. [hide][Hidden Content]]
  7. This tool is a bruter tool that is meant to crack any email password using Brute-Force and Dictionary method supported by HTTP Proxies. This tool is a bruter tool that is meant to crack email password. This tool is meant for research purposes only and any malicious usage of this tool is prohibited. Short Description What is LazyBruter? LazyBruter is one of its first-kind Email Bruteforcer. Using only 2 threads, LazyBruter can bruteforce passwords 200% faster than any ordinary bruter, thanks to its 2-inverted-threads. Version This is the Beta version of LazyBruter (v1.2), but we are improving day by day. Features LazyBruters can provide different features (for more information click here) Full support of PHP vulnerable websites It is possible to provide a single target URL, get the list of targets from Burp proxy or WebScrab proxy requests log files, get the whole HTTP request from a text file or get the list of targets. Tests provided GET parameters, POST parameters, HTTP proxies. 2-inverted-threads Algorithm This algorithm excecutes 2x faster, which means passwords are crackable 2x faster than any ordinary bruter. [HIDE][Hidden Content]]
  8. Starry Router Camera suffers from vulnerabilities where the PIN can be brute-forced and the HTML5 CORS ORIGIN is set with a wildcard. View the full article
  9. WordPress Anti-Malware Security and Brute-Force Firewall plugin version 4.18.63 suffers from a local file inclusion vulnerability. View the full article

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.