Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication.
Download: http://sourceforge.net/projects/worawita
Bruter version 1.0
May 3, 2010
0 Comments
Explore More
What are cryptographic attacks?
Cryptographic attacks are methods of evading the security of a cryptographic system by finding weaknesses in such areas as the code, cipher, cryptographic protocol or key management scheme in the
LDAP Injection Vulnerabilities
LDAP Injection Overview LDAP Injection attacks are not as common as the other types of injection attacks, but if your product uses an LDAP server this must be tested. An
WikiLeaks supporters step up cyber war
LONDON (AFP)— A group of hackers vowed on Thursday to intensify a “war of data” against Mastercard, Visa and other groups which have cut funding to the WikiLeaks website over
