Search Results for "android brute force attack"

Showing 34 open source projects for "android brute force attack"

View related business solutions
  • Choose Fast, Secure, File Handling. Choose Filestack. Icon
    Choose Fast, Secure, File Handling. Choose Filestack.

    Let Filestack’s advanced security, intelligence, and uploading features simplify your file handling tasks.

    Filestack covers every available facet of file handling with ease, from rapid file uploads to swift, secure file delivery. Take advantage of advanced image intelligence to detect and tag objects in your photos, or use OCR to easily parse and process image text. Filestack Workflows allow you to automate complex file processing pathways into a single API call with an intuitive, low code interface. Everything your app could need, in one place.
  • 1
    airgeddon

    airgeddon

    This is a multi-use bash script for Linux systems

    .... Offline password decrypting on WPA/WPA2 captured files for personal networks (Handshakes and PMKIDs) using a dictionary, brute-force, and rule-based attacks with aircrack, crunch and hashcat tools. Enterprise networks captured password decrypting based on john the ripper, crunch, asleap and hashcat tools. GPU support available for hashcat. Only Rogue/Fake AP mode to sniff using external sniffer (Hostapd + DHCP + DoS).
    Downloads: 19 This Week
    Last Update:
    See Project
  • 2
    pH7 Social Dating CMS (pH7Builder)❤️

    pH7 Social Dating CMS (pH7Builder)❤️

    🚀 Professional Social Dating Web App Builder (formerly pH7CMS)

    pH7CMS is a Professional, Free & Open Source PHP Social Dating Builder Software (primarily designed for Webmasters and Developers ...). This Social Dating Web App is fully coded in object-oriented PHP (OOP) with the MVC pattern (Model-View-Controller). It is low resource intensive, extremely powerful and highly secure. pH7CMS is included with over 42 native modules and based on its homemade pH7 Framework which includes more than 52 packages To summarize, pH7CMS Social Dating Script gives...
    Leader badge
    Downloads: 114 This Week
    Last Update:
    See Project
  • 3
    Secure File Vault

    Secure File Vault

    A very secure file vault for private files to avoid hackers

    A File vault to store all of your personal items, this file vault could not be brute forced (impossible because of the hashing algorithms). It uses a combination of veracrypt, winrar, 7zip to encrypt your files to ensure that they are secure and not be seen by someone. Once you start to create the file vault, your password gets hashed a million times (only takes 3 seconds) then base 64 3 times and hashed 1 more time, it uses a combination of SHA256, SHA512 and lot of other secret algorithms...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Password Generator

    Password Generator

    Using our program, you can create a strong password with ease.

    Using our program, you can create a strong password with ease. One of the best features of this program is that it enables you to save any password that you create in a file with the time and date . Here are some tips . To prevent your passwords from being hacked by social engineering, brute force or dictionary attack method, and keep your online accounts safe, you should notice that:1. Do not use the same password, security question and answer for multiple important accounts.2. Use a password...
    Downloads: 1 This Week
    Last Update:
    See Project
  • The Most Comprehensive JavaScript Framework Icon
    The Most Comprehensive JavaScript Framework

    Harness the power of 140+ professionally built UI components designed to enhance your JavaScript application development.

    140+ UI components, such as HTML5 calendar, grids, pivot grid D3 adapter, trees, lists, forms, menus, toolbars, panels windows, and much more. Ext JS is the most comprehensive JavaScript framework for building data-intensive, cross-platform web and mobile applications for any modern device.
  • 5
    waircut

    waircut

    WPS wireless protocol audit software for Windows

    Wireless Air Cut is a WPS wireless, portable and free network audit software for Ms Windows. It is used to check the security of our wps wireless networks and to detect possible security breaches. You can check if the router has a generic and known wps pin set, if it is vulnerable to a brute-force attack or is vulnerable to a Pixie-Dust attack. You can see the Installation instructions on Wiki. ------- Wireless Air Cut es un software de auditoria del protocolo WPS en redes wireless, portable...
    Leader badge
    Downloads: 3,721 This Week
    Last Update:
    See Project
  • 6
    Cracx

    Cracx

    simple and light-weight archive password cracker

    Cracx allows you to crack archive passwords of any encryption using 7-zip, WinRAR or a custom command, via Brute Force or Dictionary attack. Note: You must NOT use this program with files you don't have the rights to extract/open/use them! Currently, the program requires a current version of either 7-zip or WinRAR to be installed, but you can also use it to bruteforce basically anything that is executably via command-line with custom parameters. On an i7 CPU, it runs approximately 30...
    Leader badge
    Downloads: 65 This Week
    Last Update:
    See Project
  • 7
    WP Limit Login Attempts

    WP Limit Login Attempts

    Limit login attempts and protect wordpress from attack

    Limit login attempts and protect wordpress from brute force attacks. Free and light weight plugin. https://ciphercoin.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Wordpress Dictionary Attackz ..

    Wordpress Dictionary Attackz ..

    I guarantee it will works a hundred percent ..

    Brute-force/dictionary attack the wordpress password from its login page (wp-admin.php)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    miniPHP

    miniPHP

    A small, simple PHP MVC framework skeleton that encapsulates a lot of

    miniPHP A small, simple PHP MVC framework skeleton that encapsulates a lot of features surrounded with powerful security layers. miniPHP is a very simple application, useful for small projects, helps to understand the PHP MVC skeleton, know how to authenticate and authorize, encrypt data and apply security concepts, sanitization and validation, make Ajax calls and more. It's not a full framework, nor a very basic one but it's not complicated. You can easily install, understand, and use it...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Connect and collaborate while working remotely Icon
    Connect and collaborate while working remotely

    Asana is a remote work software solution to keep your team connected

    Empower your remote team to plan projects, coordinate work remotely, and hit their goals with Asana.
  • 10
    ... longer passwords to make any brute force attack as difficult as possible. This application uses FIPS-181 for generating passwords and it is particularly vulnerable to brute force attacks that are targeted specifically towards the algorithm. I added modifications to the implementation (such as allowing the insertion of random numbers or symbols between syllables) with the intention of protecting against a targeted attack, but I cannot make any supported claims as to its effectiveness.
    Leader badge
    Downloads: 31 This Week
    Last Update:
    See Project
  • 11
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    ...-stretching and an adaptive key setup phase, the complexity (number of rounds) of which is automatically set to match the processing power of the encrypting computer. This makes it highly resistant to dictionary attack. AESTextCrypt is written in Java, so can be run on all desktop platforms - Windows, Mac and Linux.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12
    Wordpie Python Based Brute Force

    Wordpie Python Based Brute Force

    Python Based Brute Force Password Cracking Assistant By Clownsec

    A python script used to generate all possible password combinations for cracking WAP and other logins or password files. This program is open source. If you see the need to repair or change something by all means do so, but share your findings. *HONK* Usage: wordpie.py [-h] [-o OUTPUT] [-min MIN_SIZE] [-max MAX_SIZE] [-N] [-L] [-U] [-S] [-A] [-v] Generate a wordlist with all possible combinations of letters including: -L (Lowercase Letters) -U (Uppercase Letters) -N (Numbers) -S...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Shell OS
    Build by Rajib Acharyya(Spid3r64) ANONIMITY Metasploit Armitage Cobalt Strike & veil WIRELESS SECURITY SNIFFERS PYTHON,PERL & RUBY FORENSICS BRUTE FORCE & DDOS ANDROID TOOLS Based on : Ubuntu 12.04 LTS(32bit) (Custom Backbox) user:root pass:india Kernel version =>3.8.0-29 generic Desktop environment's => xfce,conky,Docky Version 1.0(full) Extra Softwares inbuilt => Skype,Virtualbox,Filezila,Chromium Browser,XDM(Xtreme Download Manager) ,Gimp,Python...many more Credit...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Vigenere Dictionary Attack

    Vigenere brute force / dictionary cracking tool

    This is a tool that uses a combination between a brute force and dictionary attack on a Vigenere cipher. At present, keys are generated using brute force (will soon try passwords generated from a dictionary first). Each key is then used to decode the encoded message input. The output is analysed and then put into a ranking table. Outputs will be ranked on a variety of factors (at present, only number of dictionary words in output are counted). For the future: Better key generation, trying...
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • Full-stack observability. Effortless onboarding. Icon
    Full-stack observability. Effortless onboarding.

    LogicMonitor seamlessly monitors everything from networks to applications to the cloud

    LogicMonitor is the leading fully automated, cloud-based infrastructure monitoring and observability platform for enterprise IT and managed service providers. Gain IT insights, seamless data collaboration at scale, and visibility into networks, cloud, applications, servers, log data and more within one unified platform.
  • 15
    CrackThis!

    CrackThis!

    Data Encrypton Software utilizing IMPACT

    ...-like operation, we created very robust encryption methodology which will secure information for some time to come through sheer numbers and flexibility. With 2^65536 possible keys a brute force attack on a key is simply infeasible. The full version, due to release March 11, 2013 will allow password protection which helps protect your information by forcing the impostor to not only produce the 65536 bit key, but have your password as well and allows for individual passwords for individual files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    MD5HashCracker

    Cracks MD5 hashes using brute force attack

    The MD5 hash algorithm is widely used and is vulnerable to dictionary and brute force attacks. A dictionary attack and database will be added for this program later.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    HTTP Anti Flood/DoS Security Module

    HTTP Anti Flood/DoS Security Module

    Detect Flooder IPs, Reduce Attack Surface against HTTP Flood Attacks

    This module provides attack surface reduction enhancements against the HTTP Flood Attacks at the web application level. Massive crawling/scanning tools, HTTP Flood tools can be detected and blocked by this module via htaccess, firewall or iptables, etc. (like mod_evasive) You can use this module by including "iosec.php" to any PHP file which wants to be protected. You can test module here: http://www.iosec.org/test.php (demo) Watch the Proof of Concept video: http://goo.gl/dSiAL Hakin9...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 18
    thad0ctor's Backtrack 5 toolkit

    thad0ctor's Backtrack 5 toolkit

    thad0ctor's BT5 toolkit streamlines word list creation and other tasks

    ... phrases. In short it is the ultimate tool for those looking to make a wide variety of word lists for dictionary based and other brute force attacks. The toolkit is designed with usability in mind for the Backtrack 5R2 linux distro but will also work on BT5 R1 and other Ubuntu based distros if configured properly. The script is constantly updated with multiple revisions to include new cutting edge features and improvements in order to provide full spectrum wordlist creation capabilities.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    SSH FTP Brute Force
    This is a script to perform a dictionary based attack through protocol FTP and SSH2. You need libssh2 to use ssh2 methods. Syntax use: perl ssh2ftpcrack.pl [ssh or ftp] [user] [host] [wordlist] http://packetstormsecurity.org/Crackers/wordlists/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Program for brute force recovering a Oracle password hash. This is my first ever Linux program(after some hello world programs) Still learning how to program C
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A cryptographically secure random password generator for Linux written in python and GTK 2.0.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    This is a Linux command line program that attempts a brute force dictionary attack on a password protected zip file. If successful it will display the password and automatically unzip the file.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23
    brute-force attack is a technique of computer security systems by using the trial of all possible keys.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    Brute Force Grid is a Process sharing framework on Peer to Peer overlay network. To demonstrate the application we have used the brute force attack to the hashes by hashing algorithms. License : GNU General Public License version 3 (GPLv3)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    Detect your web servers being scanned by brute force tools and vulnerability scanners.Helps you quickly identify probable probing by bad guys who's wanna dig possible security holes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
Oh no! Some styles failed to load. 😵 Please try reloading this page