Ethical hacking tools and resources for penetration testing and red team operations. Task: Password Cracking
Explore 8 curated tools and resources
A login cracker that can be used to crack many types of authentication protocols.
Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.
Open source application for retrieving passwords stored on a local computer with support for various software and platforms.
A suite of tools for Wi-Fi network security assessment and penetration testing.
A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.
A penetration testing tool for intercepting SSH connections and logging plaintext passwords.
A powerful tool for extracting passwords and performing various Windows security operations.
A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.