This is a password hash cracker written in Rust. It supports cracking password hashes from Linux (/etc/shadow) and Windows (NTLM).
- Supports MD5, SHA256, SHA512, and NTLM hash types.
- Reads from rockyou wordlist file to perform a dictionary attack.
- Identifies the hash type automatically.
- Docker support for easy deployment and usage.
NB. The container ships with rockyou.txt included!
You can run the program in a Docker container with compose. For this you just need to have Docker installed.
- Download the docker-compose.yml
- Run the program with docker-compose
docker-compose run cracker
- Grab the latest release
- Download a wordlist (rockyou was used, but feel free to use any and rename to "rockyou.txt") and place it next to the program in wordlist/rockyou.txt
├── FolderWithFiles/
└── aHashCracker
└── wordlist/
└── rockyou.txt
- Execute binary and pwn passwords!
The program will prompt for the hash line
Enter the line from /etc/shadow or SAM DB:
adamino:502:c46b9e588fa0d112de6f59fd6d58eae3:C196CAE1F0F364BAF748EE0E7F753A15:::
...
[9997] No match...
[9998] No match...
[9999] No match...
Cracked password: Attempt: 10000
Result: adamino:kupal
You'll need to install Rust in order to run the project.
- Clone the repository:
git clone https://github.com/onero/aHashCracker.git
cd aHashCracker
-
Download a wordlist (rockyou was used, but feel free to use any and rename to "rockyou.txt") and place it next to the program in wordlist/rockyou.txt
-
Build the project:
cargo build --release
- Run the program:
cargo run
Contributions to this project are welcome. Please create a pull request with your changes.
This project is licensed under the MIT License. See the LICENSE file for details.