Home > Information > Forum > Show Topic
Show thread topic
Reset Windows Password v14.2
Telegram data recovery, Photo Database and Media Player investigation tools, and some more
Office password recovery tools
Resetting VBA passwords
New blog post
Dumping the history of users' IP addresses in Windows
Reset Windows Password v14.1
IP addresses history viewer, fast disk search, local security editor and some more

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action


ksec, 08:02:02 19.09.2017 Rating: 0 #1


Dear Passcape, 

it would be great to add agents on a network to allow clustering. Passware has been offering this feature for a while. Since your products are great, it would create a massive improvement in the recovery. 

Also it would be good to add in WPR something to accept a txt file with multiple masks instead to run them individually,

Passcape_Admin, 08:55:40 19.09.2017 Rating: 0 #2

RE: Suggestions  

Thanks for the suggestions. Yes, distributed recovery would be very handy. We have already started new project for that. Ideally, it should support for multiple attacks and password types. However it is limited to a couple of hash types at the moment. And it is moving very slowly. Here's the link:
Distributed Password Recovery forum

Using multiple masks is a great idea. We have this feature wtitten down in our todo list for the new program. But to make it as simple to user as possible, it would be nice using in tis way:
  • User provides a list of real passwords or simple wordlist and select a preferrable attack. The program could even use a built-in dictionary.

  • The program runs down the list of passwords and generates masks for the selected attack. For example, Letmein123 could be Ullllllddd for simple mask attack or Wddd for another attack, where W is a word. Well, you got the idea.

  • User sorts out some masks or reorganize them (for example, faster should be used first) and runs the attacks

Entries 1 to 2 from 2  [ <<  1  >> ]