Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.
Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
Ideal for conference and event planners, independent planners, associations, event management companies, non-profits, and more.
YesEvents offers a comprehensive suite of services that spans the entire conference lifecycle and ensures every detail is executed with precision. Our commitment to exceptional customer service extends beyond conventional boundaries, consistently exceeding expectations and enriching both organizer and attendee experiences.
pngacidbath is the one true PNG image bruteforce compressor. While other tools simply run down a list of "intelligent" compressor algorithms (some known as zlib methods), pngacidbath tries every byte combination to come up with THE smallest file.
Tipalti delivers smart payables that elevate modern business.
Our robust pre-built connectors and our no-code, drag-and-drop interface makes it easy and fast to automatically sync vendors, invoices, and invoice payment data between Tipalti and your ERP or accounting software.
BFS-CS uses a bruteforce search to solve a given rubiks cube. It aims at finding the shortest solve possible. The tool provides a cube editor using OpenGL.
Code to bruteforce the 32-bit key used to RC4 encrypt .pwl files.
PROJECT HAS MOVED TO GITHUB:
https://github.com/alex-georgiou/rc4-32.asm
Code to bruteforce the 32-bit key used to RC4 encrypt .pwl files. Assembles to a 992 byte .COM file using the Intel Architecture Assembler v1.0 Copyright (c) 1998 augusto at dcc.ufmg.br.
http://web.archive.org/web/19981205090800/http://www.dcc.ufmg.br/~augusto/project/iasm.zip
Program for bruteforce recovering a Oracle password hash. This is my first ever Linux program(after some hello world programs) Still learning how to program C
For small businesses looking for desktop accounting software
With AccountEdge, business owners can organize, process, and report on their financial information so they can focus on their business. Features include: accounting, integrated payroll, sales and purchases, contact management, inventory tracking, time billing, and more.
Search Based Password Strength Analyzer
Proof-of-Concept. Determines password resilience against dictionary attacks, opposed to brute-force attacks like most other password strength analyzers. Utilizes Bing API to collect statistics.
Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication.
This is a Linux command line program that attempts a bruteforce dictionary attack on a password protected zip file. If successful it will display the password and automatically unzip the file.
Heuristic password bruteforce cracking. Project blather attempts to find a middle ground between bruteforce password cracking and dictionary attacks using language heuristics.
ModRWLBF stands for ModRW Logical BruteForce.
It's a tool designed to help penetration testers identify rewrite rules used by webservers using logical methods as well as pure bruteforce.
BruteForce Grid is a Process sharing framework on Peer to Peer overlay network. To demonstrate the application we have used the bruteforce attack to the hashes by hashing algorithms. License : GNU General Public License version 3 (GPLv3)
Simple UI to test the effectiveness of a heuristic algorithm against the bruteforce method for path finding among an arbitrary number of arbitrarily placed points on a grid. This is an educational project, don't expect new and better methods.
An attempt to send a full flagged MIME based email using open relay mail servers (authentication not required). Written in Python3. Using smtplib and email liabraries TODO: Bruteforce the SMTP authentication. Support TLS.
ShellTer is an iptables-based firewall. What sets it apart from the rest is that it has built-in SSH bruteforce protection. It is easy to configure and has an interactive CLI installer.