Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: bkhive | Distribution: Mageia |
Version: 1.1.1 | Vendor: Mageia.Org |
Release: 10.mga10 | Build date: Mon Jun 30 10:25:25 2025 |
Group: Security | Build host: localhost |
Size: 35243 | Source RPM: bkhive-1.1.1-10.mga10.src.rpm |
Packager: umeabot <umeabot> | |
Url: https://ophcrack.sourceforge.net/ | |
Summary: Dump the syskey bootkey from a Windows system hive |
This tool is designed to recover the syskey bootkey from a Windows NT/2K/XP system hive. Then we can decrypt the SAM file with the syskey and dump password hashes. Syskey is a Windows feature that adds an additional encryption layer to the password hashes stored in the SAM database.
GPLv2+
* Mon Jun 30 2025 umeabot <umeabot> 1.1.1-10.mga10 + Revision: 2231513 - Mageia 10 Mass Rebuild * Sat Dec 21 2024 pterjan <pterjan> 1.1.1-9.mga10 + Revision: 2127134 - Rebuild for patchN deprecation
/usr/bin/bkhive /usr/lib/.build-id /usr/lib/.build-id/50 /usr/lib/.build-id/50/3b2654f99a6e7961eaaa34584ed5932da2a89d /usr/share/doc/bkhive /usr/share/doc/bkhive/AUTHORS /usr/share/doc/bkhive/COPYING /usr/share/doc/bkhive/README /usr/share/man/man1/bkhive.1.xz
Generated by rpm2html 1.8.1
Fabrice Bellet, Fri Jul 4 03:03:51 2025