Feature |
Standard |
Professional |
Support for all versions of Windows starting with Win2K |
![](/images/fyes.png) |
![](/images/fyes.png) |
Windows 32/64-bit support |
![](/images/fyes.png) |
![](/images/fyes.png) |
Multithreaded recovery |
![](/images/fyes.png) |
![](/images/fyes.png) |
Interface themes |
![](/images/fyes.png) |
![](/images/fyes.png) |
Read hashes from local computer |
![](/images/fyes.png) |
![](/images/fyes.png) |
Load hashes from external PC |
![](/images/fyes.png) |
![](/images/fyes.png) |
Search for plaintext passwords |
![](/images/fyes.png) |
![](/images/fyes.png) |
Import hashes from other programs |
![](/images/fyes.png) |
![](/images/fyes.png) |
Export found passwords to a text file |
![](/images/fyes.png) |
![](/images/fyes.png) |
Export hashes to WIFIPRDUMP file |
![](/images/fyes.png) |
![](/images/fyes.png) |
Support for wifi dump files with broken packets |
![](/images/fyes.png) |
![](/images/fyes.png) |
Support for AVX2 CPU instruction set |
![](/images/fyes.png) |
![](/images/fyes.png) |
Support for RAR/ZIP packed dumps |
![](/images/fyes.png) |
![](/images/fyes.png) |
Common attacks |
![](/images/fyes.png) |
![](/images/fyes.png) |
Advanced attacks |
![](/images/fyes.png) |
![](/images/fyes.png) |
Smart attacks |
![](/images/fyes.png) |
![](/images/fyes.png) |
Batch attack |
![](/images/fno.png) |
![](/images/fyes.png) |
View AI password cache |
![](/images/fno.png) |
![](/images/fyes.png) |
Generate wordlists by mask |
![](/images/fno.png) |
![](/images/fyes.png) |
Generate wordlists by given base-word |
![](/images/fno.png) |
![](/images/fyes.png) |
Combined dictionaries generator |
![](/images/fno.png) |
![](/images/fyes.png) |
Pass-phrase dictionary generator |
![](/images/fno.png) |
![](/images/fyes.png) |
Fingerprint dictionaries generator |
![](/images/fno.png) |
![](/images/fyes.png) |
Create wordlists based on dictionary |
![](/images/fno.png) |
![](/images/fyes.png) |
Restrict access to the program |
![](/images/fyes.png) |
![](/images/fyes.png) |
Password strength measurement |
![](/images/fyes.png) |
![](/images/fyes.png) |
Online dictionaries |
![](/images/fyes.png) |
![](/images/fyes.png) |
Hash checker |
![](/images/fyes.png) |
![](/images/fyes.png) |
PMKID generator |
![](/images/fyes.png) |
![](/images/fyes.png) |
Custom handshake generator |
![](/images/fyes.png) |
![](/images/fyes.png) |
Random hash generator |
![](/images/fyes.png) |
![](/images/fyes.png) |
Multiple hashes generator |
![](/images/fno.png) |
![](/images/fyes.png) |
MAC to vendor converter |
![](/images/fyes.png) |
![](/images/fyes.png) |
Dictionary to hash generator |
![](/images/fno.png) |
![](/images/fyes.png) |
Asterisk password viewer tool |
![](/images/fyes.png) |
![](/images/fyes.png) |
Wordlist tools: create a wordlist by indexing files |
![](/images/fno.png) |
![](/images/fyes.png) |
Wordlist tools: merge wordlists |
![](/images/fyes.png) |
![](/images/fyes.png) |
Wordlist tools: wordlist statistics |
![](/images/fyes.png) |
![](/images/fyes.png) |
Wordlist tools: sorting |
![](/images/fyes.png) |
![](/images/fyes.png) |
Wordlist tools: conversion/compression |
![](/images/fyes.png) |
![](/images/fyes.png) |
Wordlist tools: wordlist comparison |
![](/images/fyes.png) |
![](/images/fyes.png) |
Wordlist tools: additional operations |
![](/images/fyes.png) |
![](/images/fyes.png) |
Wordlist tools: indexing words/passwords of HDD sensitive areas |
![](/images/fno.png) |
![](/images/fyes.png) |
Wordlist tools: HTML links extractor |
![](/images/fno.png) |
![](/images/fyes.png) |
Predefined exhausted attacks for certain networks |
![](/images/fyes.png) |
![](/images/fyes.png) |
Multimode (search passwords for multiple handshakes concurrently) |
![](/images/fyes.png) |
![](/images/fyes.png) |
Hardware monitor |
![](/images/fyes.png) |
![](/images/fyes.png) |
GPU health monitor |
![](/images/fyes.png) |
![](/images/fyes.png) |
GPU load adjustment |
![](/images/fyes.png) |
![](/images/fyes.png) |
Password filters |
![](/images/fyes.png) |
![](/images/fyes.png) |
Event notifications![](/images/new.png) |
![](/images/fyes.png) |
![](/images/fyes.png) |
Password reports |
![](/images/fno.png) |
![](/images/fyes.png) |
Run in hidden mode |
![](/images/fyes.png) |
![](/images/fyes.png) |
Number of CPU cores supported |
2 |
32 |
Number of GPU devices supported |
1 |
255 |
14-days honor-based money-back guarantee ( 1 ) |
![](/images/fyes.png) |
![](/images/fyes.png) |
License |
personal |
business |
Price |
$35 |
$99 |