[![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEil__nv61MZL3FG4a8v3X2Uw9N06OkHBvtf3kCY2nVk7CFO8E490l6qCJie83hHIZQJOyHQOqbTK4wRBk8m36TEococI0iK3qUi0grtdCqPgIzEZB_TRYidoZfTMvOlG2mV7a1RKK1vczdA_6CMhrmY–RJCtuDa587zcHBZD57YaVh_RagGyjqbiQxhw/w640-h248/password_cracking.png)]()
A curated list of awesome tools, research, papers and other projects related to password cracking and password security.
Read the [guidelines]( “guidelines” ) before contributing! In short:
* List is alphabetically sorted
* If in doubt, use [awesome-lint]( “awesome-lint” )
* If you think an item shouldn’t be here [open an issue]( “open an issue” )
## Books
* [Hash Crack: Password Cracking Manual (v3)]( “Hash Crack: Password Cracking Manual (v3)” ) – Password Cracking Manual v3 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis techniques.
## Cloud
* [Cloud_crack]( “Cloud_crack” ) – Crack passwords using Terraform and AWS.
* [Cloudcat]( “Cloudcat” ) – A script to automate the creation of cloud infrastructure for hash cracking.
* [Cloudstomp]( “Cloudstomp” ) – Automated deployment of instances on EC2 via plugin for high CPU/GPU applications at the lowest price.
* [Cloudtopolis]( “Cloudtopolis” ) – A tool that facilitates the installation and provisioning of Hashtopolis on the Google Cloud Shell platform, quickly and completely unattended (and also, free!).
* [NPK]( “NPK” ) – NPK is a distributed hash-cracking platform built entirely of serverless components in AWS including Cognito, DynamoDB, and S3.
* [Penglab]( “Penglab” ) – Abuse of Google Colab for cracking hashes.
* [Rook]( “Rook” ) – Automates the creation of AWS p3 instances for use in GPU-based password cracking.
## Conversion
* [7z2hashcat]( “7z2hashcat” ) – Extract information from password-protected .7z archives (and .sfx files) such that you can crack these “hashes” with hashcat.
* [MacinHash]( “MacinHash” ) – Convert macOS plist password file to hash file for password crackers.
* [NetNTLM-Hashcat]( “NetNTLM-Hashcat” ) – Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.
* [Rubeus-to-Hashcat]( “Rubeus-to-Hashcat” ) – Converts / formats Rubeus kerberoasting output into hashcat readable format.
* [WINHELLO2hashcat]( “WINHELLO2hashcat” ) – With this tool one can extract the “hash” from a WINDOWS HELLO PIN. This hash can be cracked with Hashcat.
* [bitwarden2hashcat]( “bitwarden2hashcat” ) – A tool that converts Bitwarden’s data into a hashcat-suitable hash.
* [hc_to_7z]( “hc_to_7z” ) – Convert 7-Zip hashcat hashes back to 7z archives.
* [hcxtools]( “hcxtools” ) – Portable solution for conversion of cap/pcap/pcapng (gz compressed) WiFi dump files to hashcat formats.
* [itunes_backup2hashcat]( “itunes_backup2hashcat” ) – Extract the information needed from the Manifest.plist files to convert it to hashes compatible with hashcat.
* [mongodb2hashcat]( “mongodb2hashcat” ) – Extract hashes from the MongoDB database server to a hash format that hashcat accepts: -m 24100 (SCRAM-SHA-1) or -m 24200 (SCRAM-SHA-256).
## Hashcat
_[Hashcat]( “Hashcat” ) is the “World’s fastest and most advanced password recovery utility.” The following are projects directly related to Hashcat in one way or another._
* [Autocrack]( “Autocrack” ) – A set of client and server tools for automatically, and lightly automatically cracking hashes.
* [docker-hashcat]( “docker-hashcat” ) – Latest hashcat docker for Ubuntu 18.04 CUDA, OpenCL, and POCL.
* [Hashcat-Stuffs]( “Hashcat-Stuffs” ) – Collection of hashcat lists and things.
* [hashcat-utils]( “hashcat-utils” ) – Small utilities that are useful in advanced password cracking.
* [Hashfilter]( “Hashfilter” ) – Read a hashcat potfile and parse different types into a sqlite database.
* [known_hosts-hashcat]( “known_hosts-hashcat” ) – A guide and tool for cracking ssh known_hosts files with hashcat.
* [pyhashcat]( “pyhashcat” ) – Python C API binding to libhashcat.
### Automation
* [autocrack]( “autocrack” ) – Hashcat wrapper to help automate the cracking process.
* [hashcat.launcher]( “hashcat.launcher” ) – A cross-platform app that run and control hashcat.
* [hat]( “hat” ) – An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes during engagements.
* [hate_crack]( “hate_crack” ) – A tool for automating cracking methodologies through Hashcat from the TrustedSec team.
* [Naive hashcat]( “Naive hashcat” ) – Naive hashcat is a plug-and-play script that is pre-configured with naive, emperically-tested, “good enough” parameters/attack types.
### Distributed cracking
* [CrackLord]( “CrackLord” ) – Queue and resource system for cracking passwords.
* [fitcrack]( “fitcrack” ) – A hashcat-based distributed password cracking system.
* [Hashtopolis]( “Hashtopolis” ) – A multi-platform client-server tool for distributing hashcat tasks to multiple computers.
* [Kraken]( “Kraken” ) – A multi-platform distributed brute-force password cracking system.
### Rules
* [clem9669 rules]( “clem9669 rules” ) – Rule for hashcat or john.
* [hashcat rules collection]( “hashcat rules collection” ) – Probably the largest collection of hashcat rules out there.
* [Hob0Rules]( “Hob0Rules” ) – Password cracking rules for Hashcat based on statistics and industry patterns.
* [Kaonashi]( “Kaonashi” ) – Wordlist, rules and masks from Kaonashi project (RootedCON 2019).
* [nsa-rules]( “nsa-rules” ) – Password cracking rules and masks for hashcat generated from cracked passwords.
* [nyxgeek-rules]( “nyxgeek-rules” ) – Custom password cracking rules for Hashcat and John the Ripper.
* [OneRuleToRuleThemAll]( “OneRuleToRuleThemAll” ) – “One rule to crack all passwords. or atleast we hope so.”
* [pantagrule]( “pantagrule” ) – Large hashcat rulesets generated from real-world compromised passwords.
### Rule tools
* [duprule]( “duprule” ) – Detect & filter duplicate hashcat rules.
### Web interfaces
* [crackerjack]( “crackerjack” ) – CrackerJack is a Web GUI for Hashcat developed in Python.
* [CrackQ]( “CrackQ” ) – A Python Hashcat cracking queue system.
* [hashpass]( “hashpass” ) – Hash cracking WebApp & Server for hashcat.
* [Hashview]( “Hashview” ) – A web front-end for password cracking and analytics.
* [Wavecrack]( “Wavecrack” ) – Wavestone’s web interface for password cracking with hashcat.
* [WebHashCat]( “WebHashCat” ) – WebHashcat is a very simple but efficient web interface for hashcat password cracking tool.
## John the Ripper
_[John the Ripper]( “John the Ripper” ) is “an Open Source password security auditing and password recovery tool available for many operating systems.” The following are projects directly related to John the Ripper in one way or another._
* [BitCracker]( “BitCracker” ) – BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker.
* [johnny]( “johnny” ) – GUI frontend to John the Ripper.
## Misc
* [hashID]( “hashID” ) – Software to identify the different types of hashes.
* [Name That Hash]( “Name That Hash” ) – Don’t know what type of hash it is? Name That Hash will name that hash type! Identify MD5, SHA256 and 300+ other hashes. Comes with a neat web app.
## Websites
### Communities
* [hashcat Forum]( “hashcat Forum” ) – Forum by the developers of hashcat.
* [Hashmob]( “Hashmob” ) – A growing password recovery community aimed towards being a center point of collaboration for cryptography enthusiasts.
* [Hashkiller Forum]( “Hashkiller Forum” ) – A password cracking forum with over 20,000 registered users.
### Lookup services
* [CMD5]( “CMD5” ) – Provides online MD5 / sha1/ mysql / sha256 encryption and decryption services.
* [CrackStation]( “CrackStation” ) – Free hash lookup service supplying wordlists as well.
* [Hashes.com]( “Hashes.com” ) – A hash lookup service with paid features.
* [Hashkiller]( “Hashkiller” ) – A hash lookup service with a forum.
* [Online Hash Crack]( “Online Hash Crack” ) – Cloud password recovery service.
## Wordlist tools
_Tools for analyzing, generating and manipulating wordlists._
### Analysis
* [PACK]( “PACK” ) – A collection of utilities developed to aid in analysis of password lists in order to enhance password cracking through pattern detection of masks, rules, character-sets and other password characteristics.
* [pcfg_cracker]( “pcfg_cracker” ) – This project uses machine learning to identify password creation habits of users.
* [Pipal]( “Pipal” ) – THE password analyser.
### Generation/Manipulation
* [common-substr]( “common-substr” ) – Simple tool to extract the most common substrings from an input text. Built for password cracking.
* [Crunch]( “Crunch” ) – Crunch is a [wordlist generator]( “wordlist generator” ) where you can specify a standard character set or a character set you specify. Crunch can generate all possible combinations and permutations.
* [CUPP]( “CUPP” ) – A tool that lets you generate wordlists by user profiling data such as birthday, nickname, address, name of a pet or relative etc.
* [duplicut]( “duplicut” ) – Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking).
* [Gorilla]( “Gorilla” ) – Tool for generating wordlists or extending an existing one using mutations.
* [Keyboard-Walk-Generators]( “Keyboard-Walk-Generators” ) – Generate Keyboard Walk Dictionaries for cracking.
* [kwprocessor]( “kwprocessor” ) – Advanced keyboard-walk generator with configureable basechars, keymap and routes.
* [maskprocessor]( “maskprocessor” ) – High-performance word generator with a per-position configureable charset.
* [maskuni]( “maskuni” ) – A standalone fast word generator in the spirit of hashcat’s mask generator with unicode support.
* [Mentalist]( “Mentalist” ) – Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat and John the Ripper.
* [Phraser]( “Phraser” ) – Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking.
* [princeprocessor]( “princeprocessor” ) – Standalone password candidate generator using the PRINCE algorithm.
* [Rephraser]( “Rephraser” ) – A Python-based reimagining of Phraser using Markov-chains for linguistically-correct password cracking.
* [Rling]( “Rling” ) – RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.
* [statsprocessor]( “statsprocessor” ) – Word generator based on per-position markov-chains.
* [TTPassGen]( “TTPassGen” ) – Flexible and scriptable password [dictionary generator]( “dictionary generator” ) which supportss brute-force, combination, complex rule modes etc.
* [token-reverser]( “token-reverser” ) – Words list generator to crack security tokens.
* [WikiRaider]( “WikiRaider” ) – WikiRaider enables you to generate wordlists based on country specific databases of Wikipedia.
## Wordlists
### Laguage specific
* [Albanian wordlist]( “Albanian wordlist” ) – A mix of names, last names and some albanian literature.
* [Danish Phone Wordlist Generator]( “Danish Phone Wordlist Generator” ) – This tool can generate wordlists of Danish phone numbers by area and/or usage (Mobile, landline etc.) Useful for password cracking or fuzzing Danish targets.
* [Danish Wordlists]( “Danish Wordlists” ) – Collection of danish wordlists for cracking danish passwords.
* [French Wordlists]( “French Wordlists” ) – This project aim to provide french word list about everything a person could use as a base password.
### Other
* [Packet Storm Wordlists]( “Packet Storm Wordlists” ) – A substantial collection of different wordlists in multiple languages.
* [Rocktastic]( “Rocktastic” ) – Includes many permutations of passwords and patterns that have been observed in the wild.
* [RockYou2021]( “RockYou2021” ) – RockYou2021.txt is a MASSIVE WORDLIST compiled of various other wordlists.
* [WeakPass]( “WeakPass” ) – Collection of large wordlists.
## Specific file formats
* [pdfrip]( “pdfrip” ) – A multi-threaded PDF password cracking utility equipped with commonly encountered password format builders and dictionary attacks.
### PEM
* [pemcracker]( “pemcracker” ) – Tool to crack encrypted PEM files.
### JKS
* [JKS private key cracker]( “JKS private key cracker” ) – Cracking passwords of private key entries in a JKS fileCracking passwords of private key entries in a JKS file.
### ZIP
* [bkcrack]( “bkcrack” ) – Crack legacy zip encryption with Biham and Kocher’s known plaintext attack.
* [frackzip]( “frackzip” ) – Small tool for cracking encrypted ZIP archives.
## Artificial Intelligence
* [adams]( “adams” ) – Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries. []( “A curated list of awesome tools, research, papers and other projects related to password cracking and password security. (133)” ) – Code for cracking passwords with neural networks.
* [RNN-Passwords]( “RNN-Passwords” ) – Using the char-rnn to learn and guess passwords.
* [rulesfinder]( “rulesfinder” ) – This tool finds efficient password mangling rules (for John the Ripper or Hashcat) for a given dictionary and a list of passwords.
## Research
### Papers
* [Generating Optimized Guessing Candidates toward Better Password Cracking from Multi-Dictionaries Using Relativistic GAN (2020)]( “Generating Optimized Guessing Candidates toward Better Password Cracking from Multi-Dictionaries Using Relativistic GAN (2020)” )
* [GENPass: A General Deep Learning Model for Password Guessing with PCFG Rules and Adversarial Generation (2018)]( “GENPass: A General Deep Learning Model for Password Guessing with PCFG Rules and Adversarial Generation (2018)” )
* [Password Cracking Using Probabilistic Context-Free Grammars (2009)]( “Password Cracking Using Probabilistic Context-Free Grammars (2009)” )
* [Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries (2020)]( “Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries (2020)” )
* [Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks (2016)]( “Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks (2016)” )
* [PassGAN: A Deep Learning Approach for Password Guessing (2017)]( “PassGAN: A Deep Learning Approach for Password Guessing (2017)” )
### Talks
* [DEF CON Safe Mode Password Village – Getting Started with Hashcat]( “DEF CON Safe Mode Password Village – Getting Started with Hashcat” )
* [DEF CON Safe Mode Password Village – Jeremi Gosney – Cracking at Extreme Scale]( “DEF CON Safe Mode Password Village – Jeremi Gosney – Cracking at Extreme Scale” )
* [Tailored, Machine Learning-driven Password Guessing Attacks and Mitigation at DefCamp]( “Tailored, Machine Learning-driven Password Guessing Attacks and Mitigation at DefCamp” )
* [UNHash – Methods for better password cracking]( “UNHash – Methods for better password cracking” )
* [USENIX Security ’21 – Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries]( “USENIX Security ’21 – Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries” )
* [USENIX Security ’16 – Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks ]( “USENIX Security ’16 – Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks” )
**[Awesome-Password-Cracking]( “Download Awesome-Password-Cracking” )**Read More
References
Back to Main