File2File Cryptomathic is a dictionary based attack on encrypted files. It works by looping through the wordlist, load the encrypted executable, enter the password, and click ok, if the success dialog is shown then stop with the found password, and if not then kill the application and continue looping.
Like it? Share with your friends!
Other Windows Software of Developer «Christopher Doman»:
Windows Executable Packer Windows Executable Packer is a program built for packing executables of Windows application. Select an executable file, run the file to extract all DLL files, select required DLL's, and create a package. It works by detecting whether the executable is .NET
Recovery Linux Recovery Linux is a program contains tiny USB version of Linux and DOS files. It creates a bootable USB drive that contains DOS and Linux files for recovery purpose.
File Activity Timeline Portable File Activity Timeline is an application to evaluate timelines of file activity. It works by running the tool ftimes to create detailed maps of specified locations and importing these maps into a SQLLite database for fast and detailed querying.
ShadowMap ShadowMap is a utility for mapping Windows volume shadow copies, allowing them to be queried and compared.
Volume shadow copies are created by Windows automatically to allow backups to previous versions of files.
They are very useful for backups an
Carver Recovery Benefits
Recover files from images of disks that have severely damaged or erased disks.
A file carving application that works as follows:
- Running Scalpel with a customized config file against the image;
- Then running Exif
iOS Email to CSV Benefits
Portability for your email messages
Forensic analysis of iOS emails
How it works
Apple iOS products store e-mails as a SQLLite database. This application can read these, and export them to a simple spreadsheet (CSV) format. This format can the
Forensic Image Search Benefits
Quickly search the whole of that massive file for interesting data
Use it to search disk images for delete files and log files
Automatically scans for suspicious data that you didn't know you were looking for
Zoom in on interesting data and vi
SE HOME SE Home encryption provides one-click encryption for individual files and/or folders on your PC, Laptop, Removable Device, or in the Cloud with services like Dropbox, Microsoft SkyDrive or Google Drive. Simply right click on any file and select "encrypt" t
Secure It Now Secure It Now provides you an option to encrypt & decrypt the files with enhanced security of an online server which means nobody can encrypt or decrypt your data with login with authorized license by connecting to server.Requirements:Microsoft .NET Framew
File Waster Protects your files from prying eyes with secure encryption technology. Your personal information, financial data and indeed any file on your computer can be at risk. Be safe, the encryption used by File Waster has no known successful attacks against it -
Shiny Shainy is an application to encrypt your secret files inside image. Only Shainy can decrypt the encrypted files. Select base image file, files to encrypt, and enter image name to save. To decrypt just load the image and click on decrypt button.
Double Password Double Password creates a key to your OS, writes it onto a USB gadget and voila: no one, except you can log into your Windows. You can configure the program so, that it will allow your system to operate only if your flash drive is inserted. Double Password
Active@ Eraser Active@ ERASER keeps your system secure from undesired data recovery. Securely overwrites and destroys all data on physical drive or logical partition, restore deleted FAT and NTFS Logical Drives, supports IDE / ATA / SCSI hard disk drives, large (more tha
LicenseWelder Make your application only runnable on the customer target computer. LicenseWelder provides license copy protection to prevent duplication of your Windows software in seconds without having to write any code. It embeds the customer computer-hardware finger
LockPhix LockPhix is the ultimate combination between system locking tools and encryption software. It provides a very versatile ScreenLock tool to lock your system showing a customizable screen. You can then unlock your computer with Password, USB-stick or keystro
Windows 2000 Protected Store Key Length Vulnerability Patch A Protected Store is provided as part of CryptoAPI, in order to provide secure storage for sensitive information such as private keys and certificates. By design, the Protected Store should always encrypt the information using the strongest cryptography av
ImagiPass Most of us have important passwords that we would never want to forget or outsiders to know. This is where ImagiPass comes in. The main goal of ImagiPass is to provide maximum security for passwords. ImagiPass is as safe as Fort Knox. No one else but you w
Supported Operating Systems:
Windows 2003 |
Windows 7 |
Windows Vista |
Windows XP |
Comments on File2File Cryptomathic:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10