Free tools are available which can be used to bruteforce attack a system. However, successful infiltration high depends on the complexity of the password and how powerful the computer is used.
Below are the list of the most common Bruteforce attack tools:
John the Ripper
Cain and Abel