Loading...
Browse 0 cybersecurity solutions, with 0 security professionals searching monthly
A comprehensive collection of wordlists for bruteforcing and password cracking, covering various hashing algorithms and sizes.
Game-based cybersecurity training platform with simulated Linux environment.
Password recovery tool for encrypted ZIP, 7Zip, and RAR archives.
Password recovery tool for MS Office, WordPerfect, Lotus & other office docs.
Instantly recovers passwords from IBM/Lotus SmartSuite documents.
Recovers/removes passwords and restrictions from encrypted PDF files.
Mobile forensic bundle for physical, logical & OTA acquisition of iOS/Android/cloud.
Distributed GPU-accelerated password recovery for 300+ file/encryption formats.
Enterprise appliance for privacy-safe password security assessment & enforcement.
Online password generator that creates secure, random passwords
A login cracker that can be used to crack many types of authentication protocols.
SecLists is a comprehensive repository of security testing lists including usernames, passwords, URLs, fuzzing payloads, and web shells used during penetration testing and security assessments.
Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.
Find leaked credentials by scanning repositories for high entropy strings.
A powerful tool for extracting passwords and performing various Windows security operations.
Open source application for retrieving passwords stored on a local computer with support for various software and platforms.
A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.
A suite of tools for Wi-Fi network security assessment and penetration testing.
A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.
Hashcat is a fast and advanced password recovery utility that supports various attack modes and hashing algorithms, and is open-source and community-driven.
Get strategic cybersecurity insights in your inbox