Loading...
Browse 26 password cracking tools
Game-based cybersecurity training platform with simulated Linux environment.
Password recovery tool for encrypted ZIP, 7Zip, and RAR archives.
Password recovery tool for MS Office, WordPerfect, Lotus & other office docs.
Instantly recovers passwords from IBM/Lotus SmartSuite documents.
Recovers/removes passwords and restrictions from encrypted PDF files.
Mobile forensic bundle for physical, logical & OTA acquisition of iOS/Android/cloud.
Distributed GPU-accelerated password recovery for 300+ file/encryption formats.
Password audit service that identifies weak passwords in Active Directory
Human-led, AI-augmented penetration testing service for compliance needs
Network penetration testing service for internal and external networks
Password strength testing service to identify weak authentication credentials
A login cracker that can be used to crack many types of authentication protocols.
SecLists is a comprehensive repository of security testing lists including usernames, passwords, URLs, fuzzing payloads, and web shells used during penetration testing and security assessments.
Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.
Open source application for retrieving passwords stored on a local computer with support for various software and platforms.
A suite of tools for Wi-Fi network security assessment and penetration testing.
Hashcat is a fast and advanced password recovery utility that supports various attack modes and hashing algorithms, and is open-source and community-driven.
A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.
A powerful tool for extracting passwords and performing various Windows security operations.
A comprehensive reference guide providing practical examples and commands for using Hashcat to crack various types of password hashes.
Find leaked credentials by scanning repositories for high entropy strings.
A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.
Get strategic cybersecurity insights in your inbox