Skip to content

Passware Kit

Being a small company we are very focused on making our software meet your needs.
We’d like to hear back from you about the features that you need most.

Please vote or discuss features listed below or suggest a new feature!

Passware Kit

Categories

77 results found

  1. 1 vote
    0 comments  ·  software  ·  Admin →
    How important is this to you?
  2. Please add support for Checkpoint FDE and recovery file location.

    2 votes
    How important is this to you?
  3. Add support for McAfee Endpoint Encryption Removable Media

    2 votes
    0 comments  ·  encryption types  ·  Admin →
    How important is this to you?
  4. allow the decryption of a file from a usb thumb via dictionary and brute force attacks.

    1 vote
    How important is this to you?
  5. 3 votes
    How important is this to you?
  6. 1 vote
    How important is this to you?
  7. NTLM passwords changed after this version and cannot be cracked with traditional tools, including Passware.

    4 votes
    0 comments  ·  software  ·  Admin →
    How important is this to you?
  8. 4 votes
    How important is this to you?
  9. For all sql encryption support

    9 votes
    How important is this to you?
  10. Decryption of sessions from packet captures, if possible. Possibly by getting site cert info from live site and using key exchange in the packet capture? I know Wireshark can do this, but only for RSA key exchanges. Support for all TLS sessions would be very useful (at least to me :-) ) Thank you.

    3 votes
    How important is this to you?
  11. To make use of the most up to date server and cloud infrastructure, the Linux and Windows agents should be refactored to support a deployment as a Docker image.

    In such a containerization, the software will then be able to rapidly scale up and down (depending on the needed agent requirements for the cracking attempt) with software such as Kubernetes.

    Ideally, the Forensic Kit agent would also have features added to spin up agent instances (via Kubernetes as Docker images, or pure VM instances as images), to be able to utilize any required cloud provider that offers hosted GPUs (Azure…

    7 votes
    0 comments  ·  software  ·  Admin →
    How important is this to you?
  12. Add brute force attack for Best Crypt Volume Encryption by Jetico

    8 votes
    How important is this to you?
  13. 4 votes
    How important is this to you?
  14. It's kind of a special attack. Generally, it is used for long passwords, users use it to easily remember their passwords.
    You can find out more about it from this site:
    https://bytesdarkly.com/2014/08/generating-keyboard-walks/

    14 votes
    0 comments  ·  dictionary  ·  Admin →
    How important is this to you?
  15. Add password recovery on android images. For example "web site passwords, netword passwords, outlook passwords, user passwords, etc".

    10 votes
    1 comment  ·  software  ·  Admin →
    How important is this to you?
  16. Add support for 2-factor authentification for iCloud backups

    8 votes
    0 comments  ·  software  ·  Admin →
    How important is this to you?
  17. If we can do 2 different attack at the same time, we can use GPU's for hardware accelerated attacks and we can use CPU's for not hardware accelerated attacks. For example if we have a truecrypt file and a pdf file I want to use GPU's for truecrypt files and I want to use CPU's for pdf files. This could accelerate total access process.

    8 votes
    0 comments  ·  software  ·  Admin →
    How important is this to you?
  18. 1 vote
    0 comments  ·  encryption types  ·  Admin →
    How important is this to you?
  19. I often run an OS X image and crack a user's PLIST then move to their keychain, then internet passwords, and often times run across .DMGs or other file which need to be cracked. Each of these actions create their own report. I find myself often re-titling the reports and later combining the data to one comprehensive report. It would be far more constructive and helpful if I could choose what to include in a comprehensive report.

    Maybe if there were check boxes or an "add to report" and "Complete report" feature this could be a viable option. It would…

    1 vote
    0 comments  ·  software  ·  Admin →
    How important is this to you?
  20. Safari Forms Data through Internet Passwords...

    1 vote
    0 comments  ·  encryption types  ·  Admin →
    How important is this to you?
  • Don't see your idea?