Softwares and Drivers for Specific Models

Dell Mini
Lenovo IdeaPad
Acer Aspire
Samsung N

ASUS Eee PC Specific

Dell Mini Specific

Lenovo Specific

Acer Aspire Specific

Samsung N Specific

Toshiba Specific

Gigabyte Specific

iiView Specific

MSI Wind Specific

HP Mini
HP Mini
Sony Vaio W
LG Netbook
Windows XP Downloads
Ad Space for Rent
Rss Subscribe
Facebook Fan Page
Follow us at Twitter

HP Mini Specific

Fujitsu Specific

Sony Vaio Specific


Windows XP Softwares

Advertise Here!

Rss Subscribe

Facebook Page

Follow us @Twitter

Tablet PC Software Downloads


Ultrabook / Netbook Software Downloads » Antivirus, Firewall, Security & Spyware » PasswordsPro
Bookmark and Share Subscribe

Date Added:

Jan 18, 2013 05:16 AM

Publisher's Description:

This program is designed for recovering passwords to hashes, and supports over 180 algorithms. The software's primary features include:
– 7 types of attacks for recovering passwords to hashes.
– Maximum number of hashes in the licensed version reaches 10 millions.
– Comfortable and quick handling of large hash lists.
– Recovery of passwords of up to 127-characters length long.
– Recovery of passwords for to incomplete hashes of any type.
– Recovery of passwords in Unicode.
– Support for third-party developer's hashing modules.
– Support for using plugins.
– Editing user hashes and other data.
– Adding hashes to the list from a text file using a dialog window or clipboard.
– Copying hashes and found passwords to clipboard.
– Exporting hashes to text or HTML file.
– Searchable list of users with hashes.
– Checking current password against all or selected users on the list.
– Verifying user hashes and their passwords.
– Automatic accumulation of found passwords in the file "PasswordsPro.dic".
– Sorting hash list.
– Exporting hashes with found passwords in the format common for the InsidePro Software forum.
– Support for the "hidden" operating mode – when the program doesn't appear on the taskbar.

Types of attacks supported by the software:
Preliminary Attack – this is a quick check of user hashes for matching to simple passwords like "123", "qwerty", "99999", etc., as well as to passwords found by the program earlier.

Brute Force Attack – this is the exhaustive search through all possible passwords in a certain range; e.g., "aaaaaa"..."zzzzzz".

Mask Attack – this attack is used when some information on the lost password is known. To use the attack, make sure to specify the mask for each character in the password to be recovered in the attack settings. For mask characters you can use the conventional characters for the standard or custom character sets – ?u, ?d, ?2, etc. (see the "Character Sets" tab in the program's settings).

Simple Dictionary Attack – during this attack, the program simply checks hashes against passwords in dictionaries.

Combined Dictionary Attack – during this attack, passwords are made of several words taken from different dictionaries. That allows to recover complex passwords like "superadmin", "admin*admin", etc.

Hybrid Dictionary Attack – this attack allows modifying passwords taken from dictionaries (for example, shift the password to upper case, append '1' to the end of the password, etc.) and validating them as user passwords. The actions performed over source passwords are called "rules", and the full list of those is available in the file "Rules.txt" in the software distributive.

Rainbow Attack – this attack attempts to recover passwords using the pre-calculated Rainbow tables.

The software includes the following plugins (to obtain more information, see the file "ReadMe.txt" in the folder containing each plugin):
Dictionary Generator – generates dictionaries of passwords from a specified range and performs other functions related to using dictionaries – sorting, merging to one file, etc.

Hash Bruteforcing History – codes and decodes history of hash bruteforcing.

Hash Generator – generates hashes of all types loaded in the program.

Hash Queue – handles queues of hashes downloaded from the Internet.

Hidden Passwords Recovery – recovers text hidden behind asterisks.

NTLM Password Finder – attempts to find the NTLM password on the PasswordsPro hash list with a known LM password by checking it in all possible character cases.

Password Generator – generates random passwords with specified parameters.

Password Sender – sends recovered passwords to websites.

SQL Dump Parser – extracts hashes from SQL dumps of various forums.

Text Converter – converts text from Base64 to plain text format and the other way around.
Demo Version Restriction

Maximum number of importable users with hashes: 1.
License Agreement

1. All rights for PasswordsPro are reserved to InsidePro Software.

2. The software is available as Demo, with restrictions provided in the program description.

3. To use the software without restrictions, you must register your copy of the software by purchasing a license key (or several license keys) and then entering those in the application.

4. The use of the license keys by any persons that are not registered as authorized users of the software, as well as the distribution of or publishing the license keys are illegal. InsidePro Software reserves the right to revoke the registered user status from such key owners and ban such license keys in the future versions of the software.

5. You shall not modify, disassemble or decompile this software. Any violation of this provision in any part shall lead to the immediate termination of this License Agreement.

6. The software is provided on the "AS IS" basis. You use this software at your own risk. Under no circumstances shall the author be held liable for any data loss or damage, lost profits or any other damages caused by using or not using this software.

7. InsidePro Software guarantees that the software does not contain malware, spyware nor any other harmful code designed for performing any functions other than those stated in Program Description.

8. Using the software shall indicate your acceptance of this License Agreement.

9. If you do not wish to be bounded by the terms of this License Agreement, delete all the files of this software from your computer and stop using this software.




Last Download:

Oct 06, 2017 01:09 AM






(0 Ratings)  Must Register to Post Rating


Please Register to Post Comments


Report Broken Download Link

Some of our Latest and Top Downloads

Recent Downloads

1. Iperius Backup 4.3.3 (Added on 9/6/2015)
2. Unreal Commander 2.02.1098 (Added on 9/6/2015)
3. Far Manager 3.0.4413 Beta / 3.0.4400 Stable (Added on 9/6/2015)
4. PhonerLite 2.27 (Added on 9/6/2015)
5. Eraser (Added on 9/6/2015)
6. Phoner 3.0 (Added on 9/6/2015)
7. Pocket Radio Player 090415 (Added on 9/6/2015)
8. Notepad++ Portable 6.8.3 (Added on 9/6/2015)
9. Notepad++ 6.8.3 (Added on 9/6/2015)
10. Miranda IM Portable 0.10.35 (Added on 9/6/2015)

Latest Recommendations

1. Gesture 2Launch Full Version {Free for Limited Time} (Added on 2/27/2013)
2. Classic Shell v3.6.5 - Windows 8 Start Menu like Windows 7 (Added on 2/16/2013)
3. Opera 12.11 (Added on 12/9/2012)
4. Metro UI Tweaker for Windows 8 (Added on 11/30/2012)
5. WinSetupFromUSB 1.0 Beta8 (Added on 4/30/2012)
6. SpeedyFox 2.0 (Added on 3/25/2012)
7. My CPU Monitor 1.00 (Added on 3/12/2012)
8. Yahoo! Messenger (Added on 3/3/2012)
9. Mozilla Firefox 10.0 Final (Added on 2/7/2012)
10. BasicMouse and BasicBoard (Added on 2/1/2012)

Most Downloaded

1. WinSetupFromUSB. 0.2.3 (69167 Downloads)
2. Netbook Resolution Customizer Version 1.0 Beta2 (67272 Downloads)
3. Acer Aspire One D255 Wireless LAN Driver Win7 (62641 Downloads)
4. Acer Aspire One D270 Wireless LAN Driver Windows 7 32bit (46331 Downloads)
5. BasicMouse and BasicBoard (42775 Downloads)
6. Samsung N150 Wireless LAN,REALTEK Windows 7(32bit) 1676.12.1113.2009 (39508 Downloads)
7. Acer Aspire One D270 WebCam Application Windows 7 32bit 1.5.2108.00 (36635 Downloads)
8. AsTray Plus 1.4.0 BETA1 (36102 Downloads)
9. Acer Aspire One D255 VGA Driver Win7 (32306 Downloads)
10. Toshiba Mini NB505 Realtek Wireless LAN Driver Windows 7 (32bit) 2.00.0013.L_101021 (31789 Downloads)

Alexa Rank

RSS Subscribers

Rss Subscribe
Contact Us

Submit your Software