Skip to content
unhash is a set of tools designed to enable better password auditing
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.
default_passwords PEP 8 fixes for Sep 17, 2014
gwordlist PEP 8 fixes for Sep 16, 2014
unhash PEP 8 fixes for Sep 16, 2014
.pep8 Add .pep8 config file, wrap lines at 129 chars Sep 16, 2014 Updated README Sep 6, 2014

UNHash toolset
Tools for better password analysis

Tonimir Kisasondi (c) 2012 -

Unhash toolset contains the following tools: default_passwords

A simple tool to help with fetching common lists from various online repositories and merging them ordered by occurance and weight of each pair. Contains a user-passwords list user_pass_services_122013.txt (separated with space) that contains almost all common default preset passwords for network devices and services. Useful for checking if there are no factory passwords present on most services and devices.


Botpass scrapes which collects data from ssh honeypots. This creates lists of user/pass pairs and ips that were used by attackes. The lists use a single space as a separator, so they can be used in Metasploit out-of-the box.


Use google searches to create custom wordlists based on keywords you enter. Very useful for creating password lists based by scraping top n pages returned by google for each keyword and enhancing your chances of successful guessing.


A rule based password cracker that plays nice with john and hashcat. Check examples file for detailed examples and capabilities of this tool.


A classifer and machine learning algorithm for creation of rules to be used with unhash and identify how passwords are created (to be disclosed).

You can’t perform that action at this time.