Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication.
Download: http://sourceforge.net/projects/worawita
Bruter version 1.0
May 3, 2010
0 Comments
Explore More
What are the countermeasures against software keyloggers?
It is very hard to detect a keylogger’s activity. Hence, a Network Administrator should take the following steps as countermeasures against software keyloggers: * Actively monitor the programs running on
Mobile trace – How cell phone tracing works? Technology, and software’s
Is it possible to track a GSM/ CDMA cellular phone? Is there a software in market which tracking the location of the phone? Is it possible to track lost mobile?
You’ve Hired a Hacker (Section 4)
Section 4: Stimulus and response 4.1: My hacker did something good, and I want to reward him. Good! Here are some of the things most hackers would like to receive
