Category: Password Attacks

 

How to decrypt NS3 passwords from ZyXEL config file (NDMS V2)

Hashcat doesn’t detect AMD CPUs (SOLVED)

How to identify hash types – new tools with modern hashes support

Comprehensive Guide to John the Ripper. Part 7: Johnny – GUI for John the Ripper

How to generate dictionaries by any parameters with pydictor

Programs for generating wordlists

Generation and modification of dictionaries according to the specified rules

Comprehensive Guide to John the Ripper. Part 6: How to brute force non-standard hashes

How to generate candidate passwords that match password strength policies (filtering words with grep)