Skip to content


Switch branches/tags


Failed to load latest commit information.
Latest commit message
Commit time

Dagon - Advanced Hash Manipulation

Named after the prince of Hell, Dagon (day-gone) is an advanced hash cracking and manipulation system, capable of bruteforcing multiple hash types, creating bruteforce dictionaries, automatic hashing algorithm verification, random salt generation from Unicode to ASCII, and much more.


Bruteforcing made easy with a built in wordlist creator if you do not specify one. The wordlist will create 100,000 strings to use bruteforce

Verify what algorithm was used to create that hash you're trying to crack. You can specify to view all possible algorithms by providing the -L flag (some algorithms are not implemented yet) hash_verification

Random salting, unicode random salting, or you can make your own choice on the salt. salting

Demo video



Preferable you can close the repository with git clone alternatively you can download the zip or tarball here

Basic usage

For full functionality of Dagon please reference the homepage here or the user manual

python -h This will run the help menu and provide a list of all possible flags

python -c <HASH> --bruteforce This will attempt to bruteforce a given hash

python -l <FILE-PATH> --bruteforce This will attempt to bruteforce a given file full of hashes (one per line)

python -v <HASH> This will try to verify the algorithm used to create the hash

python -V <FILE-PATH> This will attempt to verify each hash in a file, one per line


Dagon requires python version 2.7.x to run successfully.

  • git clone
  • cd Dagon
  • pip install -r requirements.txt

This should install all the dependencies that you will need to run Dagon


All contributions are greatly appreciated and helpful. When you contribute you will get your name placed on the homepage underneath contributions with a link to your contribution. You will also get massive respect from me, and that's a pretty cool thing. What I'm looking for in contributions is some of the following:

  • Hashing algorithm creations, specifically; A quicker MD2 algorithm, full Tiger algorithms, Keychain algorithms for cloud and agile
  • More wordlists to download from, please make sure that the link is encoded
  • Rainbow table attack implementation
  • More regular expressions to verify different hash types