Secure remote access solution to your private network, in the cloud or on-prem.
Deliver secure remote access with OpenVPN.
OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
Get started — no credit card required.
Bright Data - All in One Platform for Proxies and Web Scraping
Say goodbye to blocks, restrictions, and CAPTCHAs
Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
Dark Cracker is a dictionary based brute-force DES-encrypted password cracker written in PERL which allows *nix system administrators to test password files against a dictionary of common passwords and detect accounts without a password.
Cheescloth is a security script that is used to monitor and block email being bruteforce sent to your mail server by zombie machines in control by spammers and hackers. It also will catch and block hackers trying to hack your server via SSH connection
Brute is a bruteforce hash cracker, it allows the user to specify how many threads he want running simultaneously. It is fast, and modular, all the hash algorithm dependent code lies in a module (a shared library). Modules available: MD5; SHA256; SHA512
Payroll Services for Small Businesses | QuickBooks
Save up to 50% on QuickBooks Online! Keep the Accounting and Book Keeping for your Small Business up to date!
Easily pay your team and access powerful tools, employee benefits, and supportive experts with the #1 online payroll service provider. Manage payroll and access HR and employee services in one place. Pay your team automatically once your payroll setup is complete. We'll calculate, file, and pay your payroll taxes automatically.
Mini md5 Cracker, como su nombre lo dice es un software para Windows de Crackeo de hash MD5 por Wordlist y BruteForce, escrito en C#, con GUI, sencillo, pequeño, rapido.
Detect your web servers being scanned by bruteforce tools and vulnerability scanners.Helps you quickly identify probable probing by bad guys who's wanna dig possible security holes.
This is a simple app, created around an original sudoku solver based only on heuristics, not bruteforce. It's coded in Java/SWT(GUI toolkit). It's an example of MVC and of Visitor, Observer, Strategy, Abstract Factory, Singleton Design Patterns.
Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, bruteforce usernames and passwords, exploits, and a disassembl
216,000+ customers in over 135 countries grow their businesses with HubSpot
HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
Computer chess engine written using Qt4, which works under Knights, Jose, Arena and other chess board GUI games. Uses bitboard game representation and alpha beta brute-force search to analyse chess positions.
RWSecure parses the /var/log/secure (or specified secure log) file for Invalid usernames or Failed password. If more than x invalid or failed attempts by one IP(i.e. bruteforce), it will add that IP to your /etc/hosts.deny file by default (also configur
BruteNet is a system of the distributed bruteforce and distributed calculations built on user extensions capable to solve a great number of problems related to the partition on a lot of machines.With sample extention you can distribute brute md5-hash
Authdefender is a filtering application that, in combination with iptables, blocks malicious users from accessing any aspect of the server in question. Malicious users are defined by bruteforce ssh/ftp attempts and blocked regardless of tcp wrappers.
using PHP (and some ShellScript) to protect your linux server against bruke force attacks(http://en.wikipedia.org/wiki/Brute_force_attack).
also keep a log in MySQL and have email reporting
Iman Random Password Generator, a very useful tool for Admins to generate secured password against BruteForce attack. Selectable up&lower case letters, numbers and symbols up to 1024 characters with copy to clipboard button and Auto Save configuratio
HumanSudokuSolver is intended to solve Sudoku puzzles in a way human beings would do (non bruteforce). It currently solves most of the puzzles I tried and can output a step-by-step solution. Developers who want to contribute are welcome!
Hash Cracker is an application developed in java swings that allows a user to crack MD2, MD5, SHA-1,SHA-256,SHA-384,SHA-512 hashes either using bruteforce or using wordlists of the user's choice based on the users choice.
This is rarbrute, a shell script to bruteforce encrypted rar files under unix and linux. A long wordlist and a paper about security in internet cafes is included.
BRUTALIS - BRUTeforce ALternative Is Stupid. Brutalis generate bruteforce passwords. It can be integrated in any command line for an attack and support resume, character panel, minimum and maximum length, special separating characters and more.
enumIAX is an Inter Asterisk Exchange version 2 (IAX2) protocol username brute-force enumerator. enumIAX may operate in two distinct modes; Sequential Username Guessing or Dictionary Attack.