CINXE.COM
Password auditing – SecTools Top Network Security Tools
<!DOCTYPE html> <html lang="en"> <head> <title> Password auditing – SecTools Top Network Security Tools </title> <meta name="description" content="Rankings and reviews of computer and network security software, programs, and tools."> <link rel="alternate" type="application/rss+xml" href="/feed/"> <link rel="canonical" href="https://sectools.org/tag/pass-audit/"> <link rel="next" href="https://sectools.org/tag/pass-audit/?page=2"> <meta name="viewport" content="width=device-width,initial-scale=1"> <meta name="theme-color" content="#2A0D45"> <link rel="preload" as="image" href="/images/sitelogo.png" imagesizes="168px" imagesrcset="/images/sitelogo.png, /images/sitelogo-2x.png 2x"> <link rel="preload" as="image" href="/shared/images/nst-icons.svg"> <link rel="stylesheet" href="/shared/css/nst.css?v=2"> <script async src="/shared/js/nst.js?v=2"></script> <link rel="stylesheet" href="/shared/css/nst-foot.css?v=2" media="print" onload="this.media='all'"> <link rel="stylesheet" href="/site.css"> <!--Google Analytics Code--> <link rel="preload" href="https://www.google-analytics.com/analytics.js" as="script"> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-11009417-1', 'auto'); ga('send', 'pageview'); </script> <!--END Google Analytics Code--> <META NAME="ROBOTS" CONTENT="NOARCHIVE"> <link rel="shortcut icon" href="/shared/images/tiny-eyeicon.png" type="image/png"> </head> <body><div id="nst-wrapper"> <div id="menu"> <div class="blur"> <header id="nst-head"> <a id="menu-open" href="#menu" aria-label="Open menu"> <img width="44" height="44" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#menu"> </a> <a id="menu-close" href="#" aria-label="Close menu"> <img width="44" height="44" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#close"> </a> <a id="nst-logo" href="/" aria-label="Home page"> <img alt="Home page logo" srcset="/images/sitelogo.png, /images/sitelogo-2x.png 2x" src="/images/sitelogo.png" onerror="this.onerror=null;this.srcset=this.src" height=90 width=168></a> <nav id="nst-gnav"> <a class="nlink" href="https://nmap.org/">Nmap.org</a> <a class="nlink" href="https://npcap.com/">Npcap.com</a> <a class="nlink" href="https://seclists.org/">Seclists.org</a> <a class="nlink" href="https://sectools.org">Sectools.org</a> <a class="nlink" href="https://insecure.org/">Insecure.org</a> </nav> <form class="nst-search" id="nst-head-search" action="/search/"> <input class="nst-search-q" name="q" type="search" placeholder="Site Search"> <button class="nst-search-button" title="Search"> <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search"> </button> </form> </header> </div> </div> <main id="nst-content"> <nav> <div id="nav"> <ul> <li><a href="/">Home</a></li> <li><a href="/about/">About/Help</a></li> <li><a href="/contrib/">Suggest a new tool</a></li> <li><form action="/search/" method="get"><input type="text" name="q" size="10"><input type="submit" value="Search"></form></li> </ul> </div> </nav> <br> <h2>SecTools.Org: Top 125 Network Security Tools</h2> <p>For more than a decade, the <a href="http://nmap.org">Nmap Project</a> has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a <a href="http://sectools.org/contrib/">new tool suggestion form</a>. This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the <a href="http://nmap.org">Nmap Security Scanner</a>, <a href="http://nmap.org/ncat/">Ncat network connector</a>, and <a href="http://nmap.org/nping/">Nping packet manipulator</a>).</p> <p>We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews. Many site elements are explained by tool tips if you hover your mouse over them. Enjoy!</p> <div class="inline-tags"> <p> Filtering by tag: </p> <ul> <li><a href="/tag/pass-audit/">pass-audit</a></li> </ul> <small><a href="/">remove filters</a></small> </div> <div style="float:right; margin-right:1em"> Sort by: <span style="margin-left:2em" title="Sort based on favorite tool votes by 2,959 people"> popularity </span> <span style="margin-left:2em" title="Sort based on tool ratings from site users like you"> <a href="/?sort=rating">rating</a> </span> <span style="margin-left:2em" title="Sort with the most recently released (including new versions) software first"> <a href="/?sort=release">release date</a> </span> </div> <p> Tools 1–10 of 12 <a style="margin-left:2em" href="?page=2">next page →</a> </p> <h2 class="toolhead"> <a href="/tool/aircrack/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(10)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★½</span> </a> <a style="margin-right:1em" href="/tool/aircrack/">Aircrack</a> (#4, <span class="rank-up" title="Change in popularity since last survey"><img src="/flags/uparrow.gif">17</span>) </h2> <div class="logo"><a href="/tool/aircrack/"><img src="/logos/aircrack-80x63.png" alt="Aircrack logo"></a></div> <p> Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It implements the best known cracking algorithms to recover wireless keys once enough encrypted packets have been gathered. . The suite comprises over a dozen discrete tools, including airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files). <a href="/tool/aircrack/#comments">Read 15 reviews.</a> </p> <p> <strong>Latest release:</strong> version 1.1 on April 24, 2010 (14 years, 7 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.aircrack-ng.org/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/Aircrack-ng"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/pass-audit/" title="Password auditing">pass-audit</a></li> <li><a href="/tag/wireless/" title="Wireless tools">wireless</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/cain/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(6)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★½</span> </a> <a style="margin-right:1em" href="/tool/cain/">Cain and Abel</a> (#6, <span class="rank-up" title="Change in popularity since last survey"><img src="/flags/uparrow.gif">3</span>) </h2> <div class="logo"><a href="/tool/cain/"><img src="/logos/cain-80x32.png" alt="Cain and Abel logo"></a></div> <p> UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also <a href="http://www.oxid.it/ca_um/">well documented</a>. <a href="/tool/cain/#comments">Read 17 reviews.</a> </p> <p> <strong>Latest release:</strong> version 4.9.56 on April 7, 2014 (10 years, 7 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.oxid.it/cain.html"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/Cain_and_Abel_(software)"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/gui/"><img src="/flags/mouse-30x30.png" title="Offers a GUI (point and click) interface." alt="Mouse icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/pass-audit/" title="Password auditing">pass-audit</a></li> <li><a href="/tag/sniffers/" title="Packet sniffers">sniffers</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/john/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(3)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★★</span> </a> <a style="margin-right:1em" href="/tool/john/">John the Ripper</a> (#10, <span class="rank-equal" title="No change in popularity since last survey">unchanged</span>) </h2> <div class="logo"><a href="/tool/john/"><img src="/logos/john-80x163.png" alt="John the Ripper logo"></a></div> <p> John the Ripper is a fast password cracker for UNIX/Linux and Mac OS X.. Its primary purpose is to detect weak Unix passwords, though it supports hashes for many other platforms as well. There is an official free version, a community-enhanced version (with many contributed patches but not as much quality assurance), and an inexpensive pro version. You will probably want to start with some wordlists, which you can find <a href="http://www.skullsecurity.org/wiki/index.php/Passwords">here</a>, <a href="ftp://ftp.ox.ac.uk/pub/wordlists/">here</a>, or <a href="http://www.outpost9.com/files/WordLists.html">here</a>. <a href="/tool/john/#comments">Read 7 reviews.</a> </p> <p> <strong>Latest release:</strong> version 1.8.0 on May 30, 2013 (11 years, 6 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.openwall.com/john/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/John_the_Ripper"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/costs/"><img src="/flags/dollarlogo_20x30.gif" title="A commercial (paid) version is available. Free/limited/trial versions may also be offered." alt="$" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/pass-audit/" title="Password auditing">pass-audit</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/hydra/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(8)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★½</span> </a> <a style="margin-right:1em" href="/tool/hydra/">THC Hydra</a> (#22, <span class="rank-down" title="Change in popularity since last survey"><img src="/flags/downarrow.gif">7</span>) </h2> <div class="logo"><a href="/tool/hydra/"><img src="/logos/hydra-100x100.png" alt="THC Hydra logo"></a></div> <p> When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like <a class="local" href="/tool/amap/">THC Amap</a> this release is from the fine folks at <a href="http://www.thc.org">THC</a>. Other online crackers are <a class="local" href="/tool/medusa/">Medusa</a> and <a href="http://nmap.org/ncrack/">Ncrack</a>. The <a href="http://nmap.org">Nmap Security Scanner</a> also contains <a href="http://nmap.org/nsedoc/categories/brute.html">many online brute force password cracking modules</a>. <a href="/tool/hydra/#comments">Read 25 reviews.</a> </p> <p> <strong>Latest release:</strong> version 8.2 on June 16, 2016 (8 years, 5 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="https://www.thc.org/thc-hydra/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/gui/"><img src="/flags/mouse-30x30.png" title="Offers a GUI (point and click) interface." alt="Mouse icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/pass-audit/" title="Password auditing">pass-audit</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/ophcrack/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(4)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★★</span> </a> <a style="margin-right:1em" href="/tool/ophcrack/">ophcrack</a> (#35, <a href="/tag/new/" class="rank-new" title="New in latest survey">new!</a>) </h2> <div class="logo"><a href="/tool/ophcrack/"><img src="/logos/ophcrack-160x40.png" alt="ophcrack logo"></a></div> <p> Ophcrack is a free rainbow-table based cracker for Windows passwords (though the tool itself runs on Linux, Windows, and Mac). Features include LM and NTLM hash cracking, a GUI, the ability to load hashes from encrypted SAM recovered from a Windows partition, and a Live CD version. Some tables are provided as a free download but larger ones have to be bought from Objectif Sécurité. <a href="/tool/ophcrack/#comments">Read 8 reviews.</a> </p> <p> <strong>Latest release:</strong> version 3.6.0 on June 4, 2013 (11 years, 5 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://ophcrack.sourceforge.net/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/Ophcrack"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/new/"><img src="/flags/new_30x30.gif" title="New in latest survey." alt="New!" border="0"></a></li> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/gui/"><img src="/flags/mouse-30x30.png" title="Offers a GUI (point and click) interface." alt="Mouse icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/pass-audit/" title="Password auditing">pass-audit</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/medusa/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(1)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★</span> </a> <a style="margin-right:1em" href="/tool/medusa/">Medusa</a> (#49, <a href="/tag/new/" class="rank-new" title="New in latest survey">new!</a>) </h2> <p> Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. It supports many protocols: AFP, CVS, FTP, HTTP, IMAP, rlogin, SSH, Subversion, and VNC to name a few. Other online crackers are <a class="local" href="/tool/hydra/">THC Hydra</a> and <a href="http://nmap.org/ncrack/">Ncrack</a>. <a href="/tool/medusa/#comments">Read 1 review.</a> </p> <p> <strong>Latest release:</strong> version 2.0 on Feb. 9, 2010 (14 years, 9 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.foofus.net/jmk/medusa/medusa.html"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/new/"><img src="/flags/new_30x30.gif" title="New in latest survey." alt="New!" border="0"></a></li> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/pass-audit/" title="Password auditing">pass-audit</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/fgdump/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(1)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★</span> </a> <a style="margin-right:1em" href="/tool/fgdump/">fgdump</a> (#52, <span class="rank-down" title="Change in popularity since last survey"><img src="/flags/downarrow.gif">5</span>) </h2> <p> fgdump is a newer version of the <a href="http://www.foofus.net/fizzgig/pwdump/">pwdump</a> tool for extracting NTLM and LanMan password hashes from Windows. It is also capable of displaying password histories if they are available. It outputs the data in <a class="local" href="/tool/l0phtcrack/">L0phtCrack</a>-compatible form, and can write to an output file. fgdump attempts to disable antivirus software before running. It then runs pwdump, cachedump (cached credentials dump), and pstgdump (protected storage dump). <a href="/tool/fgdump/#comments">Read 1 review.</a> </p> <p> <strong>Latest release:</strong> version 2.1.0 on Sept. 18, 2008 (16 years, 2 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://swamp.foofus.net/fizzgig/fgdump/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/pwdump"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/pass-audit/" title="Password auditing">pass-audit</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/l0phtcrack/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(1)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★</span> </a> <a style="margin-right:1em" href="/tool/l0phtcrack/">L0phtCrack</a> (#57, <span class="rank-down" title="Change in popularity since last survey"><img src="/flags/downarrow.gif">30</span>) </h2> <div class="logo"><a href="/tool/l0phtcrack/"><img src="/logos/l0phtcrack-64x64.gif" alt="L0phtCrack logo"></a></div> <p> L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, then re-acquired by the original L0pht guys and <a href="http://www.l0phtcrack.com/">reborn as LC6 in 2009</a>. For free alternatives, consider <a class="local" href="/tool/ophcrack/">ophcrack</a>, <a class="local" href="/tool/cain/">Cain and Abel</a>, or <a class="local" href="/tool/john/">John the Ripper</a>. <a href="/tool/l0phtcrack/#comments">Read 1 review.</a> </p> <p> <strong>Latest release:</strong> version 6.0.11 on Jan. 9, 2011 (13 years, 10 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.l0phtcrack.com"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/L0phtCrack"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/costs/"><img src="/flags/dollarlogo_20x30.gif" title="A commercial (paid) version is available. Free/limited/trial versions may also be offered." alt="$" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/gui/"><img src="/flags/mouse-30x30.png" title="Offers a GUI (point and click) interface." alt="Mouse icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/pass-audit/" title="Password auditing">pass-audit</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/solarwinds/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(1)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★</span> </a> <a style="margin-right:1em" href="/tool/solarwinds/">SolarWinds</a> (#62, <span class="rank-down" title="Change in popularity since last survey"><img src="/flags/downarrow.gif">16</span>) </h2> <div class="logo"><a href="/tool/solarwinds/"><img src="/logos/solarwinds-80x47.png" alt="SolarWinds logo"></a></div> <p> SolarWinds has created and sells dozens of special-purpose tools targeted at systems administrators. Security-related tools include many network discovery scanners, an SNMP brute-force cracker, router password decryption, a TCP connection reset program, one of the fastest and easiest router config download/upload applications available and more. <a href="/tool/solarwinds/#comments">Read 2 reviews.</a> </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.solarwinds.net/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/SolarWinds"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/costs/"><img src="/flags/dollarlogo_20x30.gif" title="A commercial (paid) version is available. Free/limited/trial versions may also be offered." alt="$" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/gui/"><img src="/flags/mouse-30x30.png" title="Offers a GUI (point and click) interface." alt="Mouse icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/pass-audit/" title="Password auditing">pass-audit</a></li> <li><a href="/tag/traffic-monitors/" title="Traffic monitoring tools">traffic-monitors</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/rainbowcrack/#comments"> <span style="float:right; min-width:5em; margin-left:0.5em">no rating</span> </a> <a style="margin-right:1em" href="/tool/rainbowcrack/">RainbowCrack</a> (#105, <span class="rank-down" title="Change in popularity since last survey"><img src="/flags/downarrow.gif">56</span>) </h2> <p> The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished. <a href="/tool/rainbowcrack/#comments">Read 1 review.</a> </p> <p> <strong>Latest release:</strong> version 1.61 on April 25, 2015 (9 years, 7 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://project-rainbowcrack.com/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/RainbowCrack"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/pass-audit/" title="Password auditing">pass-audit</a></li> </ul> </li> </ul> <p> Tools 1–10 of 12 <a style="margin-left:2em" href="?page=2">next page →</a> </p> <h3 id="categories">Categories</h3> <ul> <li><a href="/tag/antimalware/">Antimalware (3)</a></li> <li><a href="/tag/app-scanners/">Application-specific scanners (3)</a></li> <li><a href="/tag/browser/">Web browser–related (4)</a></li> <li><a href="/tag/crypto/">Encryption tools (8)</a></li> <li><a href="/tag/debuggers/">Debuggers (5)</a></li> <li><a href="/tag/firewalls/">Firewalls (2)</a></li> <li><a href="/tag/forensics/">Forensics (4)</a></li> <li><a href="/tag/fuzzers/">Fuzzers (4)</a></li> <li><a href="/tag/general/">General-purpose tools (8)</a></li> <li><a href="/tag/ids/">Intrusion detection systems (6)</a></li> <li><a href="/tag/packet-crafters/">Packet crafting tools (6)</a></li> <li><a href="/tag/pass-audit/">Password auditing (12)</a></li> <li><a href="/tag/port-scanners/">Port scanners (4)</a></li> <li><a href="/tag/rootkit-detectors/">Rootkit detectors (5)</a></li> <li><a href="/tag/sec-distros/">Security-oriented operating systems (5)</a></li> <li><a href="/tag/sniffers/">Packet sniffers (14)</a></li> <li><a href="/tag/sploits/">Vulnerability exploitation tools (11)</a></li> <li><a href="/tag/traffic-monitors/">Traffic monitoring tools (10)</a></li> <li><a href="/tag/vuln-scanners/">Vulnerability scanners (11)</a></li> <li><a href="/tag/web-proxy/">Web proxies (4)</a></li> <li><a href="/tag/web-scanners/">Web vulnerability scanners (20)</a></li> <li><a href="/tag/wireless/">Wireless tools (5)</a></li> </ul> </main><!-- content --> <footer id="nst-foot"> <form class="nst-search" id="nst-foot-search" action="/search/"> <input class="nst-search-q" name="q" type="search" placeholder="Site Search"> <button class="nst-search-button" title="Search"> <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search"> </button> </form> <div class="flexlists"> <div class="fl-unit"> <h2><a class="nlink" href="https://nmap.org/">Nmap Security Scanner</a></h2> <ul> <li><a class="nlink" href="https://nmap.org/book/man.html">Ref Guide</a> <li><a class="nlink" href="https://nmap.org/book/install.html">Install Guide</a> <li><a class="nlink" href="https://nmap.org/docs.html">Docs</a> <li><a class="nlink" href="https://nmap.org/download.html">Download</a> <li><a class="nlink" href="https://nmap.org/oem/">Nmap OEM</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://npcap.com/">Npcap packet capture</a></h2> <ul> <li><a class="nlink" href="https://npcap.com/guide/">User's Guide</a> <li><a class="nlink" href="https://npcap.com/guide/npcap-devguide.html#npcap-api">API docs</a> <li><a class="nlink" href="https://npcap.com/#download">Download</a> <li><a class="nlink" href="https://npcap.com/oem/">Npcap OEM</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://seclists.org/">Security Lists</a></h2> <ul> <li><a class="nlink" href="https://seclists.org/nmap-announce/">Nmap Announce</a> <li><a class="nlink" href="https://seclists.org/nmap-dev/">Nmap Dev</a> <li><a class="nlink" href="https://seclists.org/fulldisclosure/">Full Disclosure</a> <li><a class="nlink" href="https://seclists.org/oss-sec/">Open Source Security</a> <li><a class="nlink" href="https://seclists.org/dataloss/">BreachExchange</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://sectools.org">Security Tools</a></h2> <ul> <li><a class="nlink" href="https://sectools.org/tag/vuln-scanners/">Vuln scanners</a> <li><a class="nlink" href="https://sectools.org/tag/pass-audit/">Password audit</a> <li><a class="nlink" href="https://sectools.org/tag/web-scanners/">Web scanners</a> <li><a class="nlink" href="https://sectools.org/tag/wireless/">Wireless</a> <li><a class="nlink" href="https://sectools.org/tag/sploits/">Exploitation</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://insecure.org/">About</a></h2> <ul> <li><a class="nlink" href="https://insecure.org/fyodor/">About/Contact</a> <li><a class="nlink" href="https://insecure.org/privacy.html">Privacy</a> <li><a class="nlink" href="https://insecure.org/advertising.html">Advertising</a> <li><a class="nlink" href="https://nmap.org/npsl/">Nmap Public Source License</a> </ul> </div> <div class="fl-unit social-links"> <a class="nlink" href="https://twitter.com/nmap" title="Visit us on Twitter"> <img width="32" height="32" src="/shared/images/nst-icons.svg#twitter" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://facebook.com/nmap" title="Visit us on Facebook"> <img width="32" height="32" src="/shared/images/nst-icons.svg#facebook" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://github.com/nmap/" title="Visit us on Github"> <img width="32" height="32" src="/shared/images/nst-icons.svg#github" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://reddit.com/r/nmap/" title="Discuss Nmap on Reddit"> <img width="32" height="32" src="/shared/images/nst-icons.svg#reddit" alt="" aria-hidden="true"> </a> </div> </div> </footer> </div><!-- wrapper --> </body> </html>