Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Cracking Passwords Version 1.1 by: J. Dravet

      Recommended Posts

      Staff
      Spoiler

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Generates target specific word lists by searching for endpoints in javascript and appends parameters for Fuzzing with other tools

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Sifter is a OSINT, recon & vulnerability scanner. It incorporates a plethara of tools within different module sets that tries to cover every attack vector. Allowing you to quickly perform recon tasks and organize the results in one place. From OSINT to Recon, Exploitation, Post-Exploitation, OpSec, Threat Analysis, XSS, SQLinjection, Network Sca…
          Modules:
          #Enterprise Information Gatherers
              theHarvester
              Osmedeus
              ReconSpider
              CredNinja
              OSINT-Framework
          #Targeted Information Gatherers
              Maryam
              Seeker
              Sherlock
              xRay
              E2P (Email2Phone)
              ODIN
              CardPwn
              iKy
          #Domain Recon Gathering
              DnsTwist
              Armory
              SpiderFoot
              Pulsar
              SubFinder
              SubDover
          #MicroSoft Exploitation
              ActiveReign
              iSpy
              SMBGhost
              -- SMBGhost Scanner
              -- SMBGhost Exploit
          #Website Exploiters
              DDoS
              -- Dark-Star
              -- Impulse
              -- UFONet
              NekoBot
              xShock
              VulnX
          #Exploit Searching
              FindSploit
              ShodanSploit
          #Post-Exploitation
              EoP Exploit (Privilege Escalation Exploit)
              Potatoes
              -- BadPotato
              -- SweetPotato
              PEAS
              -- winPEAS
              -- linPEAS
              WinPwn
              CredHarvester
              PowerSharp
              ACLight2
              PowerHub
              InveighZero
          #Exploitation Frameworks
              DanderFuzz - Equation Group, Courtesy of the Shadow Brokers
              (Obtained through issue request.)
              - FuzzBunch
              - Danderspritz
              NevrrMore - Private Exploitation framework I've been developing that will
              not be released opensource. Due to certain 0days and other exploits/tools
              it would cause too much unintentional/illintentioned damage.
              Thoron
              Metasploit
          #Phishing
              TigerShark
          #BruteForcing
              BruteDUM
              WBruter
          #Password Tools
              Mentalist
              DCipher
              Ciphey
          #Network Scanners
              Nmap
              AttackSurfaceMapper
              aSnip
              wafw00f
              Arp-Scan
              Espionage
              Intrigue-Core
          #HoneyPot Detection Systems
              HoneyCaught
              SniffingBear
              HoneyTel (telnet-iot-honeypot)
              HFish
          #Vulnerability Scanners
              Flan
              Rapidscan
              Yuki-Chan
              Katana-VF (Vulnerability Framework)
              OWASP-Nettacker
              Big IP Remote Execution Scanner
          #Router Tools
              RouterSploit
              MkCheck
              Airgeddon
          #WebApplication Scanners
              Sitadel
              OneFind
              AapFinder
              BFAC
              reNgine
          #Website Scanners & Enumerators
              Nikto
              Blackwidow
              Wordpress
              --- WPScan
              --- WPForce/Yertle
              Zeus-Scanner
              Dirb
              DorksEye
              Katana-DS (Dork Scanner)
          #Operational Security & Threat Analysis
              EventCleaner
              Threat Dragon
          #Cross-Site Scripting & SQL Injection
              SQLinjection
              --- WhiteWidow
              --- V3n0M-Scanner
              Cross-Site Scripting
              --- XSStrike
              --- finDOM-XSS
              --- XSS-Freak
          #Web Mini-Games
              This was added in order to have a fun way to pass time
              during the more time intensive modules.
              Such as nMap Full Port scan or a RapidScan run.

          Hidden Content
          Give reaction to this post to see the hidden content. Additions:
          - HFish - A most effective HoneyPot System.
          - EventCleaner - EventLog Cleaner for Windows, with some other useful functionality.
          - SubDover - MultiThreaded Subdomain Takeover Vulnerability Scanner.
          - Katana-DS (Dork Scanner) - Google Hacking/Dorking with Tor support.
          - Threat Dragon - Threat Modelling framework.
          - Ciphey - Automated decryption/decoding/cracking tool using language processing
          & artificial intelligence.
          - Cross-Site Scripting & SQLinjection
          - WhiteWidow - Automated SQLinjection Vulnerability Scanner.
          - V3n0M-Scanner - SQLi, XSS & LFI/RFI Vuln Scanner.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          sshLooter – Script To Steal SSH Passwords
          sshLooter is a Python script using a PAM module to steal SSH passwords by logging the password and notifying the admin of the script via Telegram when a user logs in rather than via strace which is not so reliable.
          ssHLooter was inspired to steal SSH passwords via another script using Python to implement a PAM module to log failed attempts, the author just had to change the location where passwords were logged.
          Download:

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By dEEpEst
          WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords
          WiFi-Dumper is an open-source Python-based tool to dump WiFi profiles and cleartext passwords of the connected access points on a Windows machine. This tool will help you in a Wifi penetration testing and could also be useful when performing red team assessments or internal infrastructure engagements.
          Download: 

          Hidden Content
          Give reaction to this post to see the hidden content. Password: level23hacktools.com