Skip to content

joaovdonaton/hashcracker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

45 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

hashcracker

alt text

Supported hashing algorithms: SHA512, SHA256, SHA384, SHA1, MD5, SHA224
Features: auto detection of hashing algorithm based on length (not recommended), bruteforce, password list
Arguments:
type: hash algorithm (must be one of the supported hashing algorithms mentioned above or AUTO if you want to use automatic algorithm detection)
hash: can be either the hashed password, or a text file containing a list of hashes to crack (hashlist must be activated if hash is a text file containing multiple hashes)
mode: list or bruteforce
pwlist: list of passwords to compare against a single hash or a list of hashes
range: bruteforce string length range (default: 8-11)
hashlist: no parameters required for this argument, if hashlist is used, then hash should be a text file with more than 1 hash
chars: string of characters to pick from to generate random strings for bruteforce (default value is: abcdefghijklmnopqrstuvwxyzABCDEFGHJIKLMNOPQRSTUVWXYZ0123456789)

Examples:
Cracking a single hash with a password list:
hashcracker.py SHA256 11a1162b984fef626ecc27c659a8b0eead5248ca867a6a87bea72f8a8706109d -mode list -pwlist passwordlist.txt

Cracking a single hash with bruteforce:
hashcracker.py SHA256 11a1162b984fef626ecc27c659a8b0eead5248ca867a6a87bea72f8a8706109d -mode bruteforce -range 6 11 -chars abcdefghijklmnopqrstuvwxyz0123456789$#@

Cracking a list of hashes with a password list:
hashcracker.py MD5 list_of_hashes.txt -mode list -pwlist passwordlist.txt -hashlist

Cracking a list of hashes with bruteforce:
hashcracker.py MD5 list_of_hashes.txt -mode bruteforce -hashlist -range 6 11 -chars ABCDEFGHJIKLMNOPQRSTUVWXYZ0123456789

alt text