Hashes Software

 

Windows Password Cracker

Windows Password Cracker is an easy-to-use and fast Windows NT/2000/XP/2003 password recovery software. Features: - Program correctly extracts Windows NT/2000/XP/2003 users'' names and passwords in national symbol encoding - Support bruteforce and dictionary password rerovery attacks. - The program also lets to add users with known LM/NT hashes through the dialog box. - Forcing program code is written completely on Assembler

DPASHA

DPASHA created a single HASH. SHA1 160bits, MD5/MD4 120bits, RIPEMD-128 128 bits RipeMD-160 160 bits, CRC32, SHA-256 256 bits SHA-384 384 bits SHA-512 512 bits and HAVAL 256 Freewareversion. Current Version 1.5 You can test files for manipulations. Easy to use, support Drag&Drop. All hashes are standard with all other hash program and hashes. Multilanguage

The UDC

Program is designed for the password recovery by the hash-value (44 hash-functions included - MD4, MD5, DES, NTLM, GOST, SHA and others) using 5 high-speed attack methods. Distributed bruteforce and multicore attack are supported. The program is considerably optimized for the "mass cracking" (very big amount of hashes at once without decreasing of the search speed).

Advanced NT Security Explorer

A program for Microsoft Windows NT, Windows 2000 and Windows XP system administrators for finding holes in system security. It analyses user password hashes (being retrieved from Registry, memory or remote computer), and tries to recover plain-text passwords. If it's possible to recover the password in a reasonable time, the password should be considered to be insecure.

Image comparison algorithm

We are proud to present you our unique image comparison algorithm implemented as standalone dll file. It has only one exported function with two bitmap pointers in and similarity percentage out. Can work with many programming languages including Delphi, Visual C++, C#, VB and VB.NET. We can also provide you with the modified DLL. It can precalculate image hash (768 bytes) and you can use these hashes for comparison then.

LCP

Password auditing and recovery tool for Windows NT/2000/XP/2003. Accounts information import. Passwords recovering by dictionary attack, brute force attack, hybrid of dictionary and brute force attacks. Brute force session distribution. Hashes computing.

MD5 Password

MD5 Password is a password recovery tool that can recover a password if you know its MD5 hash. MD5 Password features highly configurable and fast recovery engine that can process up to 32,000 hashes simultaneously. Brute-Force Attack, Dictionary Attack, Hybrid Dictionary Attack and Smart Force Attack are supported. The support for the distributed recovery technology allows you to utilize the power of multiple computers.

PasswordsPro

The professional program to recover the passwords for user hashes. The range of hashes supported include: MySQL, MD5, SHA-1 and others. The program also supports many complex hashes like md5($pass.$salt), md5(md5($pass)) and others. Because the program has a convenient open API, it is possible to quickly modify and supply the program with any required hashing module written in any programming language.

QuickHash Library

Fast, highly optimized implementation of hash and checksum algorithms: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD(128,160,256,320), PANAMA, TIGER, CRC-32, CRC-16, CRC-CCITT, ADLER32. The library allows to calculate hashes (message digests), checksums and HMACs for files, memory blocks, strings, streaming data. Has no external dependencies such as MFC DLL, COM/DCOM or other component. The help file has examples in Visual Basic(VB), C, C++.

Authent-I

Authent-I includes over 20 forms of authentication hashes supported, including the popular MD5, CRC, & SHA methods! Also, you get an intricate file comparison tool that verifies every file and finds any duplicates! In addition it features a full fledged Mass File verification tool to run multiple authentications on thousands of files at once! And theres more!

EDCrypt

Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files

SHA-1 Password

SHA-1 Password is a password recovery tool that can recover a password if you know its SHA-1 hash. SHA-1 Password features highly configurable and fast recovery engine that can process up to 32,000 hashes simultaneously. Brute-Force Attack, Dictionary Attack, Hybrid Dictionary Attack and Smart Force Attack are supported. The support for the distributed recovery technology allows you to utilize the power of multiple computers.

HashMyFiles

HashMyFiles is small utility that allows you to calculate the MD5 and SHA1 hashes of one or more files in your system. You can easily copy the MD5/SHA1 hashes list into the clipboard, or save them into text/html/xml file. HashMyFiles can also be launched from the context menu of Windows Explorer, and display the MD5/SHA1 hashes of the selected file or folder.

Nsauditor Network Security Auditor

Nsauditor is a network security scanner that allows to audit and monitor network computers for possible vulnerabilities , to see all open ports on your system and owner program names, including the process loaded modules, kernel objects, memory details, remote address and state of connections, dns name, country where from, service associated with connection, possible trojans associated with port and service description.

MegaChart

MegaChart is an ActiveX (COM) component that allows to dynamically create professional looking charts of all common types (2d & 3d bars, pies, lines, stacked bars etc.) with just a few lines of code on your favorite language. Chart images can be exported as a binary data to server side applications (CGI, ASP), saved in files (JPG,GIF,BMP,TIFF) or used in any Windows application. The component can generate charts according to data from XML-files.

Windows Password

NT/2000/XP/2003 system administrators can use WinPassword to find breaches in system security. The program tries to recover plain-text passwords analyzing user password hashes. If it is possible decrypt a password within reasonable time, the password should be considered insecure. WinPassword uses Smart Table Recovery (TM) based on precomputed recovery tables (rainbow tables) that allows decrypting long and complex passwords quickly.

NT Password

NT Password is an application for Windows NT system administrators for finding breaches in system security. It tries to recover plain-text passwords analyzing user password hashes. If it is possible to recover a password within reasonable time, the password should be considered insecure. NT Password also can be used to recover lost passwords of particular users. Really fast: search speed is about 2,000,000 passwords per second (on 1 Ghz system)

Openwall wordlists collection CD

A full CD (600 MB) containing an extensive collection of wordlists for 20+ languages and lists of common passwords intended for use with password recovery utilities. The included languages are: Afrikaans, Croatian, Czech, Danish, Dutch, English, Finnish, French, German, Hungarian, Italian, Japanese, Latin, Norwegian, Polish, Russian, Spanish, Swahili, Swedish, Turkish, and Yiddish.

MD5 Tool

Generating MD5 hash is now fun and easy with MD5 Tool. Just drag and drop! Includes copying hash to clipboard or compare the hash with one stored in clipboard.

MEO File Encryption Software

MEO is a powerful data encryption application to encrypt or decrypt files of any type, including Microsoft Word, Excel and PDF documents. MEO allows you to protect your sensitive data against un-authorized viewers by utilizing the latest data encryption technologies. Keep your documents safe and secure with this free data encryption software.

Password Generator 2009 Professional

Generate millions of strong passwords, serial numbers, key codes, usernames, pronounceable passwords that strictly follow rules you define. Control precisely which characters can be used, how often they can appear, and where they should be placed. Use advanced elements in passwords: sequential parts, words, and non-ASCII characters. Allow or disallow consecutive characters like abc or qwerty, control repeating and duplicate characters appearance.

 

Copyright (C) 2003-2011 FilesLand.com