Hashkill is an open-source password recovery tool. Its features are:
Latest Post
Showing posts with label Password Recovery. Show all posts
Showing posts with label Password Recovery. Show all posts
07:06
hashkill-0.3.1 released!
Written By Unknown on Thursday, 13 December 2012 | 07:06
Labels:
Password Recovery
,
pentest scripts
06:35
Hash Code Cracker v1.2.1- Peneteration Testing Tool
Written By Unknown on Tuesday, 23 October 2012 | 06:35
This password cracker was written in Java and is intended for Pen Testers and Security Professionals. Please Use this software for legal purposes(Testing the Password Strength).
Features
This software will crack the MD5, SHA,NTLM(Windows Password),CISCO 7 hash codes.
This software will crack the MD5, SHA,NTLM(Windows Password),CISCO 7 hash codes.
No need to install.
Supports All platforms.
Download -
HashCodeCracker v121.jar - updated version
HashCodeCracker.zip - older version
Supports All platforms.
Download -
HashCodeCracker v121.jar - updated version
HashCodeCracker.zip - older version
V1.2.1 Changelog
Online cracking support for SHA-256,SHA-384,SHA-512,CISCO7
"Cancel " button
GUI changed
Minimum Requirements
Operating system: Any OS.
Java Runtime Environment: JRE 1.6 should be installed.(you can get it from oracle.com)
Online cracking support for SHA-256,SHA-384,SHA-512,CISCO7
"Cancel " button
GUI changed
Minimum Requirements
Operating system: Any OS.
Java Runtime Environment: JRE 1.6 should be installed.(you can get it from oracle.com)
How to run the software?
Download the "Hash Code Cracker v121.jar" file.
Method 1: Double click the jar file, it will automatically run with JRE.
Method 2: Open the Terminal and navigate to the jar file path.
Type this command "java -jar HashCodeCracker v121.jar".
Source -
http://code.google.com/p/password-cracker/
Screenshot -
Download the "Hash Code Cracker v121.jar" file.
Method 1: Double click the jar file, it will automatically run with JRE.
Method 2: Open the Terminal and navigate to the jar file path.
Type this command "java -jar HashCodeCracker v121.jar".
Source -
http://code.google.com/p/password-cracker/
Screenshot -
Labels:
cracker
,
Password Recovery
,
Penetration Testing
,
tools
22:59
Hashcat v0.41 released
Written By Unknown on Monday, 24 September 2012 | 22:59
Hashcat Released new version on 24Sept2012.
Features
- Multi-Threaded
- Free
- Multi-Hash (up to 24 million hashes)
- Multi-OS (Linux, Windows and OSX native binaries)
- Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, ...)
- SSE2 accelerated
- All Attack-Modes except Brute-Force and Permutation can be extended by rules
- Very fast Rule-engine
- Rules compatible with JTR and PasswordsPro
- Possible to resume or limit session
- Automatically recognizes recovered hashes from outfile at startup
- Can automatically generate random rules
- Load saltlist from external file and then use them in a Brute-Force Attack variant
- Able to work in an distributed environment
- Specify multiple wordlists or multiple directories of wordlists
- Number of threads can be configured
- Threads run on lowest priority
- 30+ Algorithms implemented with performance in mind
- ... and much more
Download latest version (older versions)
| Name | Version | md5sum | Date |
|---|---|---|---|
| hashcat | v0.41 | 5934c2782284a2f0c2e03a8734263cb9 | 2012.09.24 |
Hashcat Screenshot
Attack-Modes
- Straight *
- Combination *
- Toggle-Case
- Brute-Force
- Permutation
- Table-Lookup
* accept Rules
Algorithms
- MD5
- md5($pass.$salt)
- md5($salt.$pass)
- HMAC-MD5 (key = $pass)
- HMAC-MD5 (key = $salt)
- SHA1
- sha1($pass.$salt)
- sha1($salt.$pass)
- HMAC-SHA1 (key = $pass)
- HMAC-SHA1 (key = $salt)
- MySQL
- MySQL4.1/MySQL5
- phpass, MD5(Wordpress), MD5(phpBB3)
- md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5
- SHA-1(Django)
- MD4
- NTLM
- Domain Cached Credentials, mscash
- SHA256
- sha256($pass.$salt)
- sha256($salt.$pass)
- HMAC-SHA256 (key = $pass)
- HMAC-SHA256 (key = $salt)
- md5apr1, MD5(APR), Apache MD5
- SHA512
- sha512($pass.$salt)
- sha512($salt.$pass)
- HMAC-SHA512 (key = $pass)
- HMAC-SHA512 (key = $salt)
- SHA-512(Unix)
- Double MD5
- MD5(Sun)
- md5(md5(md5($pass)))
- md5(md5($salt).$pass)
- md5($salt.md5($pass))
- md5($salt.$pass.$salt)
- md5(md5($pass).md5($salt))
- md5($salt.md5($salt.$pass))
- md5($salt.md5($pass.$salt))
- md5($username.0.$pass)
- md5(strtoupper(md5($pass)))
- md5(sha1($pass))
- sha1(sha1($pass))
- sha1(sha1(sha1($pass)))
- sha1(md5($pass))
- MD5(Chap)
- nsldap, SHA-1(Base64), Netscape LDAP SHA
- nsldaps, SSHA-1(Base64), Netscape LDAP SSHA
- SMF > v1.1
- OS X v10.4, v10.5, v10.6
- MSSQL
- OS X v10.7
- MSSQL 2012
- vBulletin < v3.8.5
- vBulletin > v3.8.5
- IPB2+, MyBB1.2+
Tested OS
- All Linux, Windows and OSX versions should work on both 32 and 64 bit
Source -
Download older versions
This is a list of older hashcat versions, it's not always bad to grab the latest version.
| Name | Version | md5sum | Date |
|---|---|---|---|
| hashcat | v0.40 | 357205982dbd41dc093c1e497fe3df8e | 2012.08.05 |
| User Manual *outdated* | v1.2 | a2b1080a9b78c844dd9554991fb173bd | 2011.08.09 |
Previous post regarding Hashcat -
http://santoshdudhade.blogspot.in/2012/05/oclhashcat-lite-worlds-fastest-ntlm-md5.html
Labels:
Bootable
,
cracker
,
Hacking
,
Password Recovery
01:54
Johnny - GUI for John the Ripper v1.1.1
Written By Unknown on Friday, 17 August 2012 | 01:54
Johnny is a GUI for John the Ripper. It was proposed by Shinnok. You could look onto original version onJohn the Ripper GUI sketches page.
Release 1.1
After small fixes release version is 1.1.2.
This Johnny release is oriented onto core john. It was tested with john 1.7.9. Though all versions should work, even jumbo. All basic things work well:
- export of cracked passwords through clipboard,
- export works with office suits (tested with LibreOffice Calc),
- user could start, pause and resume attack (though only one session is allowed globally),
- all attack related options work,
- all input file formats are supported (pure hashes, pwdump, passwd, mixed),
- “smart” default options,
- accurate output of cracked passwords,
- smooth work, i.e. no lags,
- config is stored in .conf file (~/.john/johnny.conf),
- nice error messages and other user friendly things,
- many minor fixes to polish ui.
You could download and unpack tarball or use git:
git clone https://github.com/AlekseyCherepanov/johnny.git -b release1.1Then build and run (no installation required):
cd johnny
qmake
make && ./johnnyBinaries will come soon…
For more information -
http://openwall.info/wiki/john/johnny
Release 1
The first release is prepared to take more opinions from real users. This release includes all things from development release plus nice tabbed panel for mode selection and some additional clean-ups. Basic functionality is supposed to work: password could be loaded from file and cracked with different options.
What do you think? Your opinion is very welcome!
You could download and unpack tarball or use git:
git clone https://github.com/AlekseyCherepanov/johnny.git -b release1Then build and run (no installation required):
cd johnny
qmake
make && ./johnnyYou could affect decisions about GSoC 2012. Please tell us your suggestions!
Development release
To review current state and make new decisions for GSoC 2012 here is cleaned up version (that has all not implemented features not available).
- Download tarball and unpack it,
- Or clone using git,
- Enter directory,
- Build and run,
- Review and post your suggestions on john-dev list (subsribe here).
- You are welcome!
For instance,
git clone https://github.com/AlekseyCherepanov/johnny.git -b gsoc2012review
cd johnny
qmake && make && ./johnny
...Current state
Johnny is in development. Development was started as part of Summer of Security 2011 by Aleksey Cherepanov while Shinnok became a mentor for Aleksey.
Downloads
Source code is available through git:
git clone git://github.com/AlekseyCherepanov/johnny.gitLinks to other downloads are spread over this page.
For more information -
http://openwall.info/wiki/john/johnny
Screenshot -
Labels:
cracker
,
Password Recovery
23:06
thad0ctor's Backtrack 5 toolkit
Written By Unknown on Friday, 20 July 2012 | 23:06
Thad0ctor's BT5 Toolkit is designed to stream line many BT5 processes
Originally designed and focuesed as a word list creation tool, Thad0ctor's BT5 Toolkit has become an all purpose script to simplify many Backtrack 5 functions to help Pentesters strengthen their systems.
The backbone of Thad0ctor's BT5 Toolkit is the Wordlist Toolkit that contains a plethora of tools to create, modify, and manipulate word lists in order for end users to strengthen their systems by testing their passwords against a variety of tools designed to expose their pass phrases.
Download thad0ctor_s Word List Toolkit v1.2.zip (97.2 kB)
Download other versions -
http://sourceforge.net/projects/thad0ctorstools/files/word_list_toolkit/
Readme -
http://sourceforge.net/projects/thad0ctorstools/files/word_list_toolkit/word%20list%20toolkit%20v1.2/
Requirements -
-This scripts requires Backtrack 5 Linux based on Ubuntu, although
it has not been tested on other DISTROS it could work with the proper configuration.
-In order to run this script you will need the following programs:
-Zenity (optional for the GTK version)
-Policygen
-Crunch
-Find
-Cat
-Sed
-Grep
-Pyrit (for the benchmarks)
-Aircack-NG (for the benchmarks)
-PDFtoText
-System wise recommend a minimum of a dual core setup with
2 GB of RAM in addition to at least 50 GB of HDD space if you plan on making some word lists.
visit website -
http://sourceforge.net/projects/thad0ctorstools/
Screenshot -

Originally designed and focuesed as a word list creation tool, Thad0ctor's BT5 Toolkit has become an all purpose script to simplify many Backtrack 5 functions to help Pentesters strengthen their systems.
The backbone of Thad0ctor's BT5 Toolkit is the Wordlist Toolkit that contains a plethora of tools to create, modify, and manipulate word lists in order for end users to strengthen their systems by testing their passwords against a variety of tools designed to expose their pass phrases.
Download thad0ctor_s Word List Toolkit v1.2.zip (97.2 kB)
Download other versions -
http://sourceforge.net/projects/thad0ctorstools/files/word_list_toolkit/
Readme -
http://sourceforge.net/projects/thad0ctorstools/files/word_list_toolkit/word%20list%20toolkit%20v1.2/
Requirements -
-This scripts requires Backtrack 5 Linux based on Ubuntu, although
it has not been tested on other DISTROS it could work with the proper configuration.
-In order to run this script you will need the following programs:
-Zenity (optional for the GTK version)
-Policygen
-Crunch
-Find
-Cat
-Sed
-Grep
-Pyrit (for the benchmarks)
-Aircack-NG (for the benchmarks)
-PDFtoText
-System wise recommend a minimum of a dual core setup with
2 GB of RAM in addition to at least 50 GB of HDD space if you plan on making some word lists.
visit website -
http://sourceforge.net/projects/thad0ctorstools/
Screenshot -

Labels:
BackTrack
,
linux
,
Password Recovery
,
Pentest
04:23
Quarks PwDumpv0.2b change log -
> Short command flags are available, checkREADME.txt
> NTDS.dit file could be specified at any position but -nt flag must be used now
> README updated for ntds.dit backup on Win 2003 operating systems
Quarks PwDump v0.2b! released
Written By Unknown on Wednesday, 18 July 2012 | 04:23
Quarks PwDump is a native Win32 tool to extract credentials from Windows operating systems.
It currently extracts :
- Local accounts NT/LM hashes + history
- Domain accounts NT/LM hashes + history
- Cached domain password
- Bitlocker recovery information (recovery passwords & key packages)
Supported OS : XP/2003/Vista/7/2008/8
Bitlocker and domain accounts information are extracted offline from NTDS.dit. It's not currently full offline mode cause the tool is dynamically linked with ESENT.dll which differs between Windows version (see README.txt for details).
Local account and cached information are extracted live from SAM and SECURITY hive in a proper way and without code injection or service installation.
In all cases, the tool must be executed on the targeted machine with administrator privileges.
The project is still in beta test and we would really appreciate to have feedbacks or suggestions/comments about potential bugs.
> Short command flags are available, checkREADME.txt
> NTDS.dit file could be specified at any position but -nt flag must be used now
> README updated for ntds.dit backup on Win 2003 operating systems
Download -
visit website -
Our previous post regarding QuarkPwDump -
Snapshot -
Labels:
Password Recovery
,
Recovery Tool
,
windows



