Skip to content

Passware Kit

Being a small company we are very focused on making our software meet your needs.
We’d like to hear back from you about the features that you need most.

Please vote or discuss features listed below or suggest a new feature!

Passware Kit

Categories

69 results found

  1. Support for Sony PlayStation HDD encryption

    9 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  2. Sovworks' EDS app for Android uses additional algorithms for TrueCrypt and VeraCrypt that are not supported by Passware. This app is becoming more mainstream.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  3. Support for cracking cached Anydesk password hashes. Hashes of passwords (and salt) are stored in server.conf file in AppData folder tree. Passwords are believed to be in the form of a SHA256 hash of [the password with a NULL and the salt appended to the end of it]. There is a Twitter thread on this which may be helpful, located at https://twitter.com/cybergibbons/status/1525799615962185729

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  4. Support for bruteforcing/decrypting locked "Files By Google" .fgsf files. This is a mobile application by Google in which people can encrypt files with a secondary passcode.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  5. Incorporate the ability within File Explorer to right-click on a folder and select Passware Scan for the selected folder. The snapshot example below is from Windows 11. I think, if incorporated, Passware option would appear on the "Show more options" selection.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  6. Include support for various ransomware. Where a decryptor is available already, integrate them into Passware. For ransomware with no known decryptor, provide a brute force capability.

    10 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  7. Instead of Passware only supporting NUMA group 0, give other NUMA groups the support. Granted that most people will be using consumer CPU's, but for some like myself using old Xeon server CPU's. Only half of the CPU is being utilized when being used in Passware, due to the design of the CPU architecture. If only half of the CPU is being used, then that means the other half is sitting doing nothing and that's leaving performance on the table. Instead, having the ability to fully utilize these NUMA groups, can allow older hardware to continue to be used.

    8 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  8. thumb drives can have a secure volume produced by Ivanti or known as Lumension Endpoint Security... it uses the SVOLBRO.exe. any chance this can be decrypted by Passware please

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  9. Can you display the MD5 of the *.exe files on the web page. I had an issue of failed installations only to realise that the MD5 was different on each download. I got there eventually, but an MD5 check would have ensured it downloaded and / or copied across an air gap correctly.
    Thanks

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  website  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  10. 1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  11. Please add support for Checkpoint FDE and recovery file location.

    2 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  12. Add support for McAfee Endpoint Encryption Removable Media

    2 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  encryption types  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  13. 4 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  14. allow the decryption of a file from a usb thumb via dictionary and brute force attacks.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  15. NTLM passwords changed after this version and cannot be cracked with traditional tools, including Passware.

    4 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  16. 3 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  17. 1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  18. For all sql encryption support

    3 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  19. To make use of the most up to date server and cloud infrastructure, the Linux and Windows agents should be refactored to support a deployment as a Docker image.

    In such a containerization, the software will then be able to rapidly scale up and down (depending on the needed agent requirements for the cracking attempt) with software such as Kubernetes.

    Ideally, the Forensic Kit agent would also have features added to spin up agent instances (via Kubernetes as Docker images, or pure VM instances as images), to be able to utilize any required cloud provider that offers hosted GPUs (Azure…

    7 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  software  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  20. 9 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  • Don't see your idea?