Skip to content

A bruteforce/password-permutation generator and a distributed password cracker in one.

License

Notifications You must be signed in to change notification settings

blue-hexagon/Cthulhu

Repository files navigation

Cthulhu [WIP]

Cthulhu is a password generator for creating bruteforce tables and wordlists. It also acts as a distributed network p

Legal and Ethical Usage Guidelines

THIS TOOL IS FOR LEGAL PURPOSES ONLY!

Using password-cracking tools like Cthulhu or any distributed task runners without proper authorization is both illegal and unethical. Always obtain explicit permission from the system owner before conducting any security testing or password cracking activities.

Unauthorized access or intrusion attempts into computer systems, networks, or services can lead to severe legal consequences, including criminal charges and civil liabilities. Engaging in unethical hacking practices damages trust in cybersecurity professionals and can harm individuals and organizations.

Adhere to legal and ethical guidelines by obtaining explicit authorization, respecting privacy rights, and using these tools solely for legitimate security testing purposes. Remember, while every effort is made to ensure the accuracy and effectiveness of these tools, the user assumes all risks associated with their use. The tool's creator(s) are not liable for any damages, losses, or legal consequences resulting from the use or misuse of these tools.

Act responsibly and ethically in all cybersecurity endeavors.

Status

Finished Features

  • Can create bruteforce password lists saved as files or as a stream (with a generator)
    • Example: All combinations of lowercase alpha + numeric with length 6-10
    • Example: All hexcharacter combinations with length 8-12
  • Can create word-list permutations saved as a file or used as a stream
  • All itertools combinatoric iterators are supported, theese are:
  • Object serialization/deserialization for packets in transit
  • Simple form authentication attack
  • SSH authentication attack

Features in Progress

Currently working on the networking protocol and adding concurrency for the master node

Usage

import itertools

from src.bruteforce_generator import BruteforcePWGenerator, CharacterClass
from src.dictionary_generator import DictionaryPWGenerator

def use_bruteforce():
    BruteforcePWGenerator(4, 4, filename="hex_upper__4_4.txt", combinatoric_iterator=itertools.product).use_filewriter(
        [CharacterClass.DIGITS, CharacterClass.HEXDIGITS_UPPER]
    )
    bruteforce_map = BruteforcePWGenerator(1, 3, combinatoric_iterator=itertools.permutations).use_generator(["abc"])
    while 1:
        try:
            print(next(bruteforce_map))
        except StopIteration:
            break


def use_wordlist():
    DictionaryPWGenerator(filename="wl_common__4_4.txt").use_filewriter(
        (
            ["admin", "Admin", "@dmin", "adm1n", "Password", "password", "pa$$word", "Pa$$word", "p@$$w0rd"],
            ["123", "1234"],
            ["!", "!1", "*"],
        )
    )
    dictionary_map = DictionaryPWGenerator().use_generator(
        (
            ["København", "københavn", "Copenhagen", "copenhagen"],
            ["!", "!1", "*", "123", "2600", "2600!"],
        )
    )
    while 1:
        try:
            print(next(dictionary_map))
        except StopIteration:
            break


if __name__ == "__main__":
    use_bruteforce()
    use_wordlist()

License

Undetermined.

About

A bruteforce/password-permutation generator and a distributed password cracker in one.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages