John the Ripper 3.4

John the Ripper is another awesome tool that does not need any introduction. It has been a favorite choice for performing brute-force attack for long time. This free password-cracking software was initially developed for Unix systems. Later, developers released it for various other platforms.
Rainbow Crack x64 v1.7
RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. It crack hashes with rainbow tables. RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force hash crackers.
L0phtCrack x64 + x32 v7

L0phtCrack is a password auditing and recovery application originally produced by Mudge from L0pht Heavy Industries. It is used to test password strength and sometimes to recover lost Microsoft Windows passwords, by using dictionary, brute-force, hybrid attacks, and rainbow tables. It was one of the crackers' tools of choice, although most use old versions because of its low price and high availability.
Ophcrack v3.7.0
Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.
SAM Inside v2.7.0

SAMInside is a professional program for recovering logon passwords in Windows NT/2000/XP/2003/Vista, and Windows 7. This program, which does not require installation, has one of the highest password forcing speeds currently on the market.
Ncrack Nmap v0.6

Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack was designed using a modular approach, a command-line syntax similar to Nmap and a dynamic engine that can adapt its behaviour based on network feedback. It allows for rapid, yet reliable large-scale auditing of multiple hosts.
HTTP DdoS Tool v3.6

The denial of service (DOS) attack is one of the most powerful attacks used by hackers to harm a company or organization. Don’t confuse a DOS attack with DOS, the disc operating system developed by Microsoft. This attack is one of most dangerous cyber attacks. It causes service outages and the loss of millions, depending on the duration of attack. In past few years, the use of the attack has increased due to the availability of free tools.
Hacker Browser Portable v1.0

Hacker Browser Download Hacker Browser 1.0.0.9. Hacker Browser is a tiny but powerful internet browser built on the core of Internet Explorer.It is multithread smart filter proxy and multiply tab browser It is quick smart and safe. . Hacker Browser is a tiny but powerful internet browser built on the core of Internet Explorer.. Read more.
Burp Suite free Edition v1.7

The first thing you need to do is to confirm that the app’s proxy listener is active. Simply navigate to the Proxy tab and take a look in the Proxy Listeners section. You should see an entry in the table with the Running check box ticked. The second thing you are required to do is to configure your browser to use the app’s proxy listener as its HTTP proxy server. Finally, you need to configure the browser to be able to send HTTP requests through the app without problems.
Copyright © 2017 http://www.net-az.info All Rights Reserved.
MobTop.az