Location:
Search - brute attack
Search list
Description: 穷举法。整钱零找的算法 例如100元可以换出几个10元 几个20元 几个5元-Brute force attack. The whole zero-finding algorithm such as money, 100 yuan to 10 yuan for a few number of 20 yuan a few 5 yuan
Platform: |
Size: 2048 |
Author: 张超 |
Hits:
Description: This particular algorithm is a brute force attack on the popular DES Encryption standard. The DES algorithm consists of 4 main classes which will be briefly discussed
-The first class takes into consideration the assumption that the in the inputs are in hex format. Therefore a method was created to convert the hex into binary so that it could be easily permuted.
-The second class takes the converted binary input and passes it through a variety of member permutation functions.
-The next class also known as the key class handles operations on keys that have not been permuted.
-The S-box functionality is provided by the last class.
Platform: |
Size: 9216 |
Author: RobT |
Hits:
Description: 基于密码加密的暴力破解法。猜测密码长度,3-6位,并逐一尝试破解,找出正确密码。-Brute-force Search Attack on the Password-based Encryption
The program is divided into three parts: encryption, decryption and brute-force attack, which are the three methods in my class. In the brute-force attack method, use the given cipher text and the length of the password to try all possible passwords to encrypt the predefined plaintext and find the correct password.
Platform: |
Size: 16384 |
Author: Will |
Hits:
Description: It is encryption and decryption algorithm.
AES is a symmetric encryption algorithm processing data in block of 128 bits.Under the influence of a key, a 128-bit block is encrypted by transforming it in a unique way into a new block of the same size. AES is symmetric since the same key is used for encryption and the reverse transformation, decryption. The only secret necessary to keep for security is the key. AES may configured to use different key-lengths, the standard defines 3 lengths and the resulting algorithms are named AES-128, AES-192 and AES-256 respectively to indicate the length in bits of the key. Each additional bit in the key effectively doubles the strength of the algorithm, when defined as the time necessary for an attacker to stage a brute force attack, i.e. an exhaustive search of all possible key combinations in order to find the right one.
Platform: |
Size: 1195008 |
Author: asha |
Hits:
Description: 会依据已经提取出的元数据生成包含潜在用户名列表的HTML页面,这份列表对准备针对开放服务如ftp, pop3,web applications, vpn等发起蛮力破解攻击是十分有用的。
此外,该工具还可以提取元数据中泄露的目录列表,据此你可能猜到操作系统,网络名称,共享资源等。-Based on already extracted metadata generated HTML page contains the list of potential users, this list ready for the opening of the services such as ftp, pop3, web-applications, vpn, etc. initiated by the brute force cracking attack is very useful.
In addition, the tool can also extract data leak directory listing, whereby you can probably guess the operating system, network name, and shared resources.
Platform: |
Size: 11264 |
Author: wuying |
Hits:
Description: udp多线程强力攻击软件,杀人灭口必备良药。-udp multithreaded brute force attack software, murdered necessary medicine.
Platform: |
Size: 6144 |
Author: 黑色尖兵 |
Hits:
Description: XX西域论坛账号密码的Python小程序。-XX Western forum account password Python applets.
Platform: |
Size: 14336 |
Author: arhugh |
Hits:
Description: hydra used for remote brute force attack
Platform: |
Size: 10688512 |
Author: kowal |
Hits:
Description: 这个工具是一个利用phpmyadmin来破解mysql数据库密码的工具。
可以是字典或是暴力破解都可以。
mysql数据库用户名可自定义-This tool is a use of phpMyAdmin to crack MySQL password tool.
It can be either a dictionary or a brute force.
Mysql user name can be customized
Platform: |
Size: 256000 |
Author: 李志亮 |
Hits: