A hash cracking tool with GUI that supports multiple attack methods and hash algorithms. It includes support for a probabilistic mode which uses a GPT2 style autoregressive transformer model, trained for password generation and prediction.
- 🔐 Attack Modes: Wordlist, Brute-force, Rule-based, AI-powered probabilistic, Rainbow tables
- 🔒 Hash Support: MD5, SHA family, bcrypt, BLAKE2, and 20+ other algorithms
- 🤖 AI Integration: Custom GPT2 ML model for intelligent password generation and completion
- 🌈 Rainbow Tables: Bloom filter optimized storage with SQLite backend
- 🎨 Modern GUI: Dark theme interface with real-time progress tracking
Probablistic
mode uses an autoregressive transformer model, similar to GPT-2, for sequential data analysis:
Key Features: (check src/train.py)
- Transformer Architecture: Employs multi-layer, multi-head self-attention mechanisms.
- Generative: Predicts subsequent elements in a sequence.
- Configurable: Core parameters like layers, attention heads, and embedding dimensions can be adjusted.
Download the latest release from Releases and run PolycryptZero.exe
- no Python required.
git clone https://github.com/bitArtisan1/p0-Decryption-Tool.git
cd p0-Decryption-Tool
pip install -r requirements.txt
python src/main.py
- Python: 3.11+
- Dependencies:
customtkinter
,pycryptodome
,numpy
,onnxruntime
,transformers
- Enter target hash
- Select hash algorithm
- Choose attack mode
- Configure parameters (wordlist, character set, etc.)
- Start attack
For Wordlist
and Rule-Based
modes, you need a passwords wordlist to test against (e.g: rockyou.txt
):
curl -LO https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt
For probablistic mode, choose the provided onnx_model-output
directory
- 📚 Wordlist: Dictionary attack using password lists
- 💪 Brute-force: Try all possible combinations
- ⚙️ Rule-based: Apply transformations to wordlist (capitalization, leet speak, etc.)
- 🧠 Probabilistic: AI model generates likely passwords, use provided
onnx_model_output
path - 🌈 Rainbow Table: Precomputed hash lookups
- Improve model architecture for better pattern matching
- Add linux support release
- Add CUDA GPU support for probablistic attack mode
This password cracker tool, PolycryptZero™, is intended for educational and personal use only. The tool is designed to demonstrate the concepts of password hashing, security vulnerabilities, and password cracking techniques.
By using this tool, you acknowledge that:
- You are solely responsible for how you use this tool and any consequences that may arise from its use.
- Unauthorized use of this tool to access or attempt to access accounts, systems, or data that you do not have explicit permission to access is prohibited.
- The developers of this tool are not responsible for any legal or ethical issues that may result from the misuse of this tool.
- This tool should not be used for any malicious, illegal, or unethical activities.
Please use this tool responsibly and in compliance with applicable laws and regulations. The developers of this tool disclaim any liability for improper or illegal use. The name PolycryptZero™ and logo are not part of the open-source license and may not be used in derivative projects or forks without permission.
If you find this useful
- Starring the repository on GitHub
- Sharing the tool with others
- Providing feedback and suggestions
- Follow me for more :)

For any issues or feature requests, please open an issue on GitHub. Happy coding!