hash-Cracker

Simple script to get some hash cracking done effectively.

Installation

git clone https://github.com/crypt0rr/hash-cracker

For use with Apple Silicon (M1/M2) systems, please use the following repo.

git clone https://github.com/crypt0rr/hash-cracker-apple-silicon

Usage

./hash-cracker [FLAG]

Flags

    -n / --no-limit
            Disable the use of optimized kernels (un-limits password length)
    -m / --module-info
            Display information around modules/options
    -s [hash-name] / --search [hash-name]
            Will search local DB for hash module. E.g. '-s ntlm'

Examples

$ ./hash-cracker.sh 
hash-cracker v3.1 by crypt0rr (https://github.com/crypt0rr)

Checking if requirements are met:
[+] Hashcat is installed
[+] common-substr is executable
[+] Python2 available
[+] expander is executable
[+] Potfile "hash-cracker.pot" present
[+] Optimised kernels enabled

0. Exit
1. Brute force
2. Light rules
3. Heavy rules
4. Enter specific word/name/company
5. Enter specific word/name/company (brute force)
6. Hybrid
7. Toggle-case
8. Combinator
9. Iterate results
10. Prefix suffix (advise: first run steps above)
11. Common substring (advise: first run steps above)
12. PACK rulegen
13. PACK mask
14. Fingerprint attack
15. Directory of word lists plain and then with OneRuleToRuleThemAll
16. Username iteration (only complete NTDS)
17. Markov-chain passwords generator

Please enter job number: 6
Enter hashtype (number): 1000
Hashtype 1000 | NTLM selected.
Enter full path to hashlist: input-bart 
Hashlist input-bart selected.
Single or Multiple wordlist mode? S/M: s
Enter full path to wordlist: wordlists/ignis-1M.txt 
[...]

URL List