Search results
Results from the WOW.Com Content Network
John the Ripper is a free password cracking software tool. [3] Originally developed for the Unix operating system, it can run on fifteen different platforms (eleven of which are architecture-specific versions of Unix, DOS, Win32, BeOS, and OpenVMS).
Ettercap is a free and open source network security tool for man-in-the-middle attacks on a LAN.It can be used for computer network protocol analysis and security auditing.It runs on various Unix-like operating systems including Linux, Mac OS X, BSD and Solaris, and on Microsoft Windows.
Cain and Abel (often abbreviated to Cain) was a password recovery tool for Microsoft Windows.It could recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. [1]
AOHell was the first of what would become thousands of programs designed for hackers created for use with AOL. In 1994, seventeen year old hacker Koceilah Rekouche, from Pittsburgh, PA, known online as "Da Chronic", [1] [2] used Visual Basic to create a toolkit that provided a new DLL for the AOL client, a credit card number generator, email bomber, IM bomber, and a basic set of instructions. [3]
The NSA Playset is an open-source project inspired by the NSA ANT catalog to create more accessible and easy to use tools for security researchers. [20] Most of the surveillance tools can be recreated with off-the-shelf or open-source hardware and software. Thus far, the NSA Playset consists of fourteen items, for which the code and ...
Armitage is a graphical cyber attack management tool for the Metasploit Project that visualizes targets and recommends exploits. It is a free and open source network security tool notable for its contributions to red team collaboration allowing for: shared sessions, data, and communication through a single Metasploit instance. [1]
Hashcat is a password recovery tool. It had a proprietary code base until 2015, but was then released as open source software. Versions are available for Linux, macOS, and Windows. Examples of hashcat-supported hashing algorithms are LM hashes, MD4, MD5, SHA-family and Unix Crypt formats as well as algorithms used in MySQL and Cisco PIX.
Hydra can launch attacks on multiple targets at once using threads, called hydra heads. The tool keeps track of the threads using another structure, the hydra brain. Each target is attacked using a module that corresponds to a protocol(eg. if the target is an SSH server, the SSH module is used).