73 results found
-
Dictionary generation tools
Generate custom dictionaries based on BIO data, website browsing history, etc.
89 votes -
Automatic Customized Attacks using Known Passwords
I frequently have times when I have known passwords but these don't work on a file, but a variation does. I'd like to be able to give Passware the passwords I know (through text files, CSV, etc.) and have it generate attacks based on those. For example, if my known password is target123s, it would try target###?, and then target123s?, and then target123s?? (etc), and then all of these with a capital "T" on target, and an all caps "TARGET". On a recent case, I spent hours generating these attacks because of the variance of passwords the suspect used.
35 votes -
Keyboard walking support
It's kind of a special attack. Generally, it is used for long passwords, users use it to easily remember their passwords.
You can find out more about it from this site:
https://bytesdarkly.com/2014/08/generating-keyboard-walks/14 votes -
13 votes
-
share custom rules with details describing attack and feedback
Have a place on your website or forum, members only, that would allow you to upload and share custom attacks along with details and comments.
13 votes -
Import CSV list of full file paths of files to crack and option to save back to those original paths
13 votes -
Add native support for Apple Silicon Macs running the M1 and M2 series of processors
Please provide a universal binary of Passware Kit that runs natively on both Apple silicon and Intel-based Mac computers. This would allow Passware Kit to run natively on Apple's new M1 and M2 Macs, meaning improved performance and responsiveness.
12 votes -
Ransomware decryptors
Include support for various ransomware. Where a decryptor is available already, integrate them into Passware. For ransomware with no known decryptor, provide a brute force capability.
11 votes -
A professional password safe, which would protect passwords.
Given Passware's experience is decrypting passwords, and the need to protect data, it would be an ideal poacher turned gamekeeper situation, which could result in an excellent sophisticated product. Included would be high quality generated passwords, stored safely. This would not only protect password protected sites / log ons, but also protect the passwords them selves.
11 votes -
Reactivate GPU automatically after overheat
On overheat GPU: Option to re-activate GPU automatically after xy minutes...
11 votes -
compile an agent for OSX since the power of a Mac Pro will significantly boost the calculation on passwords
Having so much calculating power in our department unused on Mac Pros and iMacs...
10 votes -
10 votes
-
ZIP 5.1 encryption (PKWARE-AES)
Support for Zip 5.1 PKWARE-AES encryption
10 votes -
10 votes
-
Password carve on android images.
Add password recovery on android images. For example "web site passwords, netword passwords, outlook passwords, user passwords, etc".
10 votes -
Playstation disk encryption
Support for Sony PlayStation HDD encryption
9 votes -
SQLCIPHER
For all sql encryption support
9 votes -
Allow support for multiple NUMA groups in order to fully utilize certain CPU's
Instead of Passware only supporting NUMA group 0, give other NUMA groups the support. Granted that most people will be using consumer CPU's, but for some like myself using old Xeon server CPU's. Only half of the CPU is being utilized when being used in Passware, due to the design of the CPU architecture. If only half of the CPU is being used, then that means the other half is sitting doing nothing and that's leaving performance on the table. Instead, having the ability to fully utilize these NUMA groups, can allow older hardware to continue to be used.
8 votes -
Include more RAID controllers options in the base product.
Possible have the option to auto detect the RAID controller or to select from a list of RAID controllers.
8 votes -
If we can do 2 different attack at the same time
If we can do 2 different attack at the same time, we can use GPU's for hardware accelerated attacks and we can use CPU's for not hardware accelerated attacks. For example if we have a truecrypt file and a pdf file I want to use GPU's for truecrypt files and I want to use CPU's for pdf files. This could accelerate total access process.
8 votes
- Don't see your idea?