All Projects → jakekemple → Crackerjack

jakekemple / Crackerjack

Licence: MIT license
Multiprocessing brute-force script written in Python 3

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Crackerjack

Paroleitaliane
Liste di parole italiane
Stars: ✭ 227 (+931.82%)
Mutual labels:  bruteforce
PUPI
🛅 Passwords using personal information
Stars: ✭ 65 (+195.45%)
Mutual labels:  bruteforce
FBM-134
Hack Facebook Account Brute Force Method
Stars: ✭ 27 (+22.73%)
Mutual labels:  bruteforce
Mercury
Mercury is a hacking tool used to collect information and use the information to further hurt the target
Stars: ✭ 236 (+972.73%)
Mutual labels:  bruteforce
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+1236.36%)
Mutual labels:  bruteforce
Hades
The best way to hack into VMware accounts.
Stars: ✭ 61 (+177.27%)
Mutual labels:  bruteforce
Pentest Tools Framework
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 211 (+859.09%)
Mutual labels:  bruteforce
boxer
Boxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-31.82%)
Mutual labels:  bruteforce
BruteForce
A simple brute forcer written in GO for SHA1, SHA256, SHA512, MD5 and bcrypt
Stars: ✭ 49 (+122.73%)
Mutual labels:  bruteforce
pdfbruter
This is an offline password cracking Tools which cracks any PDF which are password protected using an inbuilt wordlist Dictionary.!
Stars: ✭ 30 (+36.36%)
Mutual labels:  bruteforce
phpmyadmin-authentication-bruteforce
phpMyAdmin Authentication Bruteforce Tool
Stars: ✭ 58 (+163.64%)
Mutual labels:  bruteforce
weakpass generator
generates weak passwords based on current date
Stars: ✭ 36 (+63.64%)
Mutual labels:  bruteforce
urlbuster
Powerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.
Stars: ✭ 144 (+554.55%)
Mutual labels:  bruteforce
Android Pin Bruteforce
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)
Stars: ✭ 217 (+886.36%)
Mutual labels:  bruteforce
RedLogin
Red Login: SSH Brute-force Tools
Stars: ✭ 99 (+350%)
Mutual labels:  bruteforce
Hackers Tool Kit
Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (+859.09%)
Mutual labels:  bruteforce
Brute-Force-Login
Proof -Of-Concept Brute Force Login on a web-site with a good dictionary of words
Stars: ✭ 231 (+950%)
Mutual labels:  bruteforce
psolving-paradigms
Common problems of dynamic programming methods and techniques, including prerequisites, for competitive programmers.
Stars: ✭ 34 (+54.55%)
Mutual labels:  bruteforce
peer-id-generator
Vanity public key generator for use with IPFS and IPNS
Stars: ✭ 27 (+22.73%)
Mutual labels:  bruteforce
AzureAD Autologon Brute
Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-active-directory-password-brute-forcing-flaw-has-no-fix/
Stars: ✭ 90 (+309.09%)
Mutual labels:  bruteforce

Crackerjack: Multiprocessing brute-force application

Written with multiprocessing library in python 3

This project was started for CSC 596: Special Readings, a research credit course at Missouri State University

What is it?

Crackerjack is a simple multi-processing bruteforce script. Given character set and max length parameters, the script will try all combinations of the character set of size max length and smaller, all while utilizing all machine cores. The script only generates all possible combinations of the given parameters. It does NOT run those generated combinations against a hash or password test. That can be implemented based on the context you wish to use Crackerjack

Get Started

  • Install python 3 if you do not already have it
  • Clone the repository

How to run:

  • From the crackerjack project directory, run python crackerjack.py [charset] [maxlength] in a terminal window (charset and maxlength are both integers). Note: If you have both Python 2 & 3 installed, run with python3 instead
  • For [charset], select an integer between 1 and 6. See "Selecting a charset" section below.
  • For [maxlength], choose an integer to designate the max size of words you wish to generate up to. For example, if you select 6, the script will generate all possible combinations of 6 character words from the charset.

Selecting a charset:

The [charset] argument determines which group of characters you want to brute-force against. For example choosing 3 will try all possible combinations of the alphabet (uppercase and lowercase) and digits.

Charset Key:

1 (digits):

0123456789

2 (lowercase letters and digits):

0123456789abcdefghijklmnopqrstuvwxyz

3 (upper and lowercase letters):

ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz

4 (upper and lowercase letters and digits):

0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz

5 (upper and lowercase letters and common special characters):

ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz!#$%&'()*+,-./:;<=>?@[\]^_`{|}~

6 (upper and lowercase letters, digits, and common special characters):

0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz!#$%&'()*+,-./:;<=>?@[\]^_{|}`~

Computation Times for password of length 5:

charset time
1 Instant
2 Instant
3 35 sec
4 1.5 min
5 ?
6 13.5 min

Computation Times for password of length 6:

charset time
1 Instant
2 200 sec
3 33 min
4 1.5 hours
5 ?
6 22 hours
  • Note: All times are for class D attacks (10 million attempts per second)

External Resources & Documentation:

  1. Multiprocessing Library
  2. Password Recovery Speeds
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].