Skip to content

Passware Kit

Being a small company we are very focused on making our software meet your needs.
We’d like to hear back from you about the features that you need most.

Please vote or discuss features listed below or suggest a new feature!

Passware Kit

Categories

23 results found

  1. Support the parsing of the memory acquisition performed via Passware Bootable Memory Imager in Volatility Framework

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  2. Very often it is required to have a Windows-based Passware Agent running and connected to the recovery process without having to login to the PC that is running the Agent. Currently once the user logs out, the Agent stops contributing,

    5 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  3. Preparing a task to recovery you need there is impossible to move couple files from one group to another when. For example: from "Custom recovery #1" to "Custom recovery #2" move 5 files at the same time just by selecting them with Ctrl button.
    Now it just one file is moving.

    3 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  4. As it stands now, the Keychain password manager decryption and extraction of it's contents are only available on the business and higher tiers of Password. I would like to see this at the lower home and small office tiers please.

    3 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  5. 10 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  6. Once Passware Kit finishes the recovery process, it shows that N passwords were analyzed. It would be useful to get the .csv or .txt of all the passwords that were checked during the recovery job for reports.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  7. Please provide a universal binary of Passware Kit that runs natively on both Apple silicon and Intel-based Mac computers. This would allow Passware Kit to run natively on Apple's new M1 and M2 Macs, meaning improved performance and responsiveness.

    12 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  8. On overheat GPU: Option to re-activate GPU automatically after xy minutes...

    11 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  9. Instead of Passware only supporting NUMA group 0, give other NUMA groups the support. Granted that most people will be using consumer CPU's, but for some like myself using old Xeon server CPU's. Only half of the CPU is being utilized when being used in Passware, due to the design of the CPU architecture. If only half of the CPU is being used, then that means the other half is sitting doing nothing and that's leaving performance on the table. Instead, having the ability to fully utilize these NUMA groups, can allow older hardware to continue to be used.

    8 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  10. 1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  11. NTLM passwords changed after this version and cannot be cracked with traditional tools, including Passware.

    4 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  12. To make use of the most up to date server and cloud infrastructure, the Linux and Windows agents should be refactored to support a deployment as a Docker image.

    In such a containerization, the software will then be able to rapidly scale up and down (depending on the needed agent requirements for the cracking attempt) with software such as Kubernetes.

    Ideally, the Forensic Kit agent would also have features added to spin up agent instances (via Kubernetes as Docker images, or pure VM instances as images), to be able to utilize any required cloud provider that offers hosted GPUs (Azure…

    7 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  13. Add password recovery on android images. For example "web site passwords, netword passwords, outlook passwords, user passwords, etc".

    10 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  14. Add support for 2-factor authentification for iCloud backups

    8 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  15. If we can do 2 different attack at the same time, we can use GPU's for hardware accelerated attacks and we can use CPU's for not hardware accelerated attacks. For example if we have a truecrypt file and a pdf file I want to use GPU's for truecrypt files and I want to use CPU's for pdf files. This could accelerate total access process.

    8 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  16. I frequently have times when I have known passwords but these don't work on a file, but a variation does. I'd like to be able to give Passware the passwords I know (through text files, CSV, etc.) and have it generate attacks based on those. For example, if my known password is target123s, it would try target###?, and then target123s?, and then target123s?? (etc), and then all of these with a capital "T" on target, and an all caps "TARGET". On a recent case, I spent hours generating these attacks because of the variance of passwords the suspect used.

    35 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  17. 10 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  18. Given Passware's experience is decrypting passwords, and the need to protect data, it would be an ideal poacher turned gamekeeper situation, which could result in an excellent sophisticated product. Included would be high quality generated passwords, stored safely. This would not only protect password protected sites / log ons, but also protect the passwords them selves.

    11 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  19. Having so much calculating power in our department unused on Mac Pros and iMacs...

    10 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  20. Possible have the option to auto detect the RAID controller or to select from a list of RAID controllers.

    8 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
← Previous 1
  • Don't see your idea?