uCF's Password RiPpEr v0.6 beta. by United Cracking Force (UCF)
1 of 150 files
nfo tool
-
This download is a Windows program, but it should only be run on your computer if you trust it.
Instead, run it isolated in Windows Sandbox, VirtualBox or Parallels.
Browsers may flag this download as unwanted or malicious. If unsure, scan it with VirusTotal. -
Last modified
MD5 checksum 9e403b38880d12215c17f817bb6bbc59
Mime type Zip archive data
Download PWRip06b.zip
Size 1.5 MB
2000 April 3
- Zip - Windows / NFO tool
52 items in the archive
- !Readme.txt
- PWRipper.asm
- make.com
- Examples/
- Examples/Test 4 - Hex serial/
- Examples/Test 4 - Hex serial/PWRipper.asm
- Examples/Test 4 - Hex serial/Test4.exe
- Examples/Test 3 - Integer serial/
- Examples/Test 3 - Integer serial/PWRipper.asm
- Examples/Test 3 - Integer serial/Test3.exe
- Examples/Test 2 - UNICODE String serial (VB4_5_6)/
- Examples/Test 2 - UNICODE String serial (VB4_5_6)/PWRipper.asm
- Examples/Test 2 - UNICODE String serial (VB4_5_6)/Test2.exe
- Examples/Test 1 - ANSI String serial/
- Examples/Test 1 - ANSI String serial/PWRipper.asm
- Examples/Test 1 - ANSI String serial/Test1.exe
- Docs/
- Docs/!Readme.txt
- Docs/Bug_Tip.txt
- Docs/LibFunc.txt
- Docs/Manual.txt
- Docs/WhatsNew.txt
- Docs/kb/
- Docs/kb/icztut1.htm
- Docs/kb/icztut2.htm
- Bin/
- Bin/COMDLG32.LIB
- Bin/CVTRES.EXE
- Bin/GDI32.LIB
- Bin/PWRipper.inc
- Bin/debug.obj
- Bin/KERNEL32.LIB
- Bin/LINK.EXE
- Bin/ML.ERR
- Bin/ML.EXE
- Bin/MSPDB50.DLL
- Bin/PESHIELD.EXE
- Bin/PETITE.EXE
- Bin/debrsrc.obj
- Bin/RC.EXE
- Bin/RCDLL.DLL
- Bin/SHELL32.LIB
- Bin/USER32.LIB
- Bin/WINDOWS.INC
- Bin/WINMM.LIB
- Bin/GUIEng.obj
- Bin/DebEng.obj
- Bin/gdi32.inc
- Bin/kernel32.inc
- Bin/user32.inc
- Bin/GUIrsrc.obj
- Bin/GUI.obj
+------------------------------------------+
| |
| +-= uCF's Password RiPpEr v0.6 beta =-+ |
| |
+------------------------------------------+
Check .\DOCS dir to find all the documentation you need on this stuff
Running MAKE.COM without parameters will show you a brief description of how to correctly invoke it