v3.9 - Custom Brute Force
For the heavy lifters, you can now do custom length brute force attacks
Changed the behavior of trap
to not only clean temporary files but keep hash-cracker alive when intentionally or unintentionally CTRL+C
is pressed
Even more ability to set static parameters
Added link to new blog
Introduced hash-cracker.conf
to set a static config yourself
Merged mandatory-checks.sh
and optional-checks.sh
into parameters.sh
Changed all processors to use the static config file if chosen
Option to use the static config --static
v3.6 - World Password Day
Removed -m
from module information
New rule - stacking58
Added Stacker based on new rule
Hashcat hardware monitoring can be enabled from now upon
Updated supported hash types, based on hashcat v6.2.6-420-gdc51a1a97
v3.4 - No More tmp_ and More Flexibility
Moved from tmp_
files to proper temporary file handling
Handling of CTRL+C
- will remove temporary file(s)
Renamed processors to match with menu option number
Added cracklib.txt
Added new parameters.sh
checking script that handles parameters given by the user
Added option to disable --loopback
(default: Enabled)
v3.3.1 - Small Effective Adjustments
Changes to digitremover.sh
v3.2 - Custom Word List Generator
Added Polish wordlist
Added missing --hwmon-disable
flag to markov-generator.sh
Replaced OneRuleToRuleThemAll with OneRuleToRuleThemStill
Split requirements.sh
into two files mandatory
and optional
Enabled Fingerprint attack - was disabled due to incompatibility with Apple Silicon
Added Custom Word List Generator - CeWL
v3.1 - To speed or not to speed #kernels
Optimized kernels are used by default but can be disabled with the -n
or --no-limit
flag
Help menu implemented
Moved search functionality
Added Markov-chain password generator based on bujimuji/markov-passwords
Added Dutch OpenTaal wordlist
Added Russian word list
Added multi word list support
Added german.txt
word list
Added two new, FaceBook based rules, thanks @singe
Added word list brutas-combined
- combining all lists in the 'passwords' category from brutas
v2.9.4 - Dump Optimization
Moved from showing cracked hashes with hashcat for use as input to directly taking the potfile
v2.9.3 - Additional word lists
Added two Afrikaans word lists
Extended public email providers list based on:
Moved from cut
to awk
since previously it was not compatible with multiple outputs
Added keyboardwalk.txt
Added email-domains
Added descriptive text for combinator in showinfo.sh
Added ?a
to brute-force pattern
Added multiple brute-force patterns
Added 3.rule
Updated light.sh and iterate.sh with 3.rule
Added COVID-19 related word list (2 parts)
Added Robot_MyFavorite.rule
v2.8 - Username as Password
Added support for username as password (currently only NTLM tested)
Extended the username as password with rules
v2.7 - Apple Silicon Edition
Initial release for Apple Silicon Edition - based on hash-cracker v2.6
Removed requirement Python2
Moved from PACK to Python3 based PACK
Added binary for Apple ARM common-substr
Added working directory for easy removal after finishing project
Added new rule
Removed coloring
v2.5 - Small fixes/extras
Added extra brute force task
Fixed issue where the variable was not cleared properly on self restart of the 'selector' scripts
Fixed issue with hash type selector not restarting on not-known hash type
Added multiple-wordlists.sh
processor - option 15
Changed starting point after finishing task to 'main' instead of 'menu'
Added three new word lists
Removed standalone usage of rulegen.py
Added complete PACK (Password Analysis and Cracking Kit by Peter Kacherginsky) repo
Added Mask Attack
Added NTLM (-m1000) example hashes
Added specific potfile instead of default
v2.1 - Extra rules for iterating
Added 4 rules
Extended the iterating processor
v2.0 - Redone way of working
Took everything from the script and put it into separate scripts
Changed from hardcoding hashcat path to dynamically with command -v
Minor rearrange of menu options
Search function showing sorted on number instead of source file
Removed exporting results for now - will be back in future update
Added PACK (Password Analysis and Cracking Kit by Peter Kacherginsky) rulegen.py
rulegen.py
implemented and tested for NTLM (mode 1000)
Moved some things around
Introducing some new rules
Small changes
New word lists
Added search function to easily find the right hash type mode you need
Renamed processor.sh
to hash-cracker.sh
v1.4 - Lets enter something yourself v2
Added function to enter a specific word as input and brute force in front and after it
Menu rearrange
v1.3 - Lets enter something yourself
Added function to enter a specific word as input and randomize it
Extended hybrid processing with non-caps jobs
Removed plain processing
Removed plain hashes from MD5 example
Changed -i
to --increment
hybrid
Added new rule - OptimizedUpToDate.rule
Small changes in list and rule lists
v1.0 - Release fully working state
v0.9 - Light and heavy lifting
Made light and heavy rules separate job
Added fordyv1.rule
Added combination attack support
Reduced information directly in the menu moved to separate overview
Added simple information about the options
Added --loopback
to rule based cracking
Extended brute force digits from 8 to 10
v0.6 - Added Prefix and suffix
Implemented prefix and suffix processing
Reordered some functions
v0.5 - Added Toggle-Case attack
Adjusted default bitmap-max
size to 24
Added two brute force defaults
Added the following rules (leetspeak, toggles1, toggles2)
Added new rules to default processing job
Added basic Toggle-Case attack
v0.4 - Added Hybrid attack
Added hybrid attack support
Removed line for uniq hashes output because not showing correct numbers depending on input
Reordered start menu
v0.3 - Added plain processing
Added the ability to process a plain word/password list against input hashes
Added tab completion for hash list and word list selector
New improved way of performing actions
Requirements checker
Iterations of results put into a separate function
Added function for result processing / output
Results to final.txt
removed, must now use option to show results