Woodpecker hash Bruteforce - A Powerful Hash Cracker
Woodpecker hash Bruteforce, also known as Hash bruteforce, is a very fast and powerful multithreaded hash cracker (brute-forcer) with many features including 4 attack types, session pausing and restoring, saving results to a file and much more.
This is definitely the simplest tool to start cracking passwords with: only three options are required to start brute-forcing (a hash, its type, and an alphabet or a wordlist as a combinations supply). The progress and the settings are shown in the command line, so you can always see what combinations are being tried right now and how many of them have been already tried. On success, the password is shown and saved to a file along with the hash and the date when it was cracked; the speed and time took to crack this password are shown as well.
This program works on Mac OS, Linux, and Windows. The code is cross-platform, so the executables for these operating systems contain the same features and provide the same speed.
Hash bruteforce comes in two variants: GUI- and command-line-only. The second one is updated much more frequently and thus uses the newest algorithms and other features, so it's recommended for download if you want the best performance, although the GUI version can be simpler in usage.
Hash types supported:
- MD2 (deprecated, removed from versions newer than 3.0, inclusive)
- MD4
- MD5
- SHA-1
- SHA-224
- SHA-256
- SHA-384
- SHA-512
- RIPEMD-160
- WHIRLPOOL
- Keccak (since v. 3.0)
- Tiger (since v. 3.0)
- Skein (since v. 3.0)
Attack types:
- Alphabet-based
- Dictionary-based
- Mask-based
- Randomised
Usage (Windows):
Woodpecker_brute_Win64 [-R] [-m] [-p ] [-w ]
[-e] [-s ] [-a ] [-b
] [-T ] [-t ] [-H
] [--] [--version] [-h]
Where:
-R, --resume
Resume brute-force using the 'Woodpecker_resume.txt' file
-m, --mask
Mask to be used for mask-based brute-force
-p
Print statistics after each N-th combination
-w, --wordlist
Wordlist to use in wordlist-based brute-force
-e, --to
Position to stop at in alphabet-based and wordlist-based or maximum
word length in random brute-force
-s, --from
Position to start from in alphabet-based and wordlist-based or minimum
word length in random brute-force
-a, --alpha
Alphabet to use in alphabet-based brute-force. Either alphabet itself
(as 'abcd') either shortcut:
alpha - [a-zA-z]
lalpha - [a-z]
ualpha - [A-Z]
dig - [0-9]
digalpha - dig + alpha
mixalpha - dig + [aA bB cC - zZ]
-b, --brute
Type of brute-force.
Available types:
1 - Alphabet-based
2 - Wordlist-based
3 - Mask-based 4 - Random
-T, --threads
Number of threads to run
-t, --type
Type of a hash. One of the
following:
MD4
MD5
SHA-1
SHA-224
SHA-256
SHA-384
SHA-512
RIPEMD-160
WHIRLPOOL
KECCAK-1600
SKEIN-512
RIPEMD-128
TIGER
-H, --hash
Hash to do brute-force of. Must be of a supported.
--, --ignore_rest
Ignores the rest of the labeled arguments following this flag.
--version
Displays version information and exits.
-h, --help
Displays usage information and exits.
You might also like:
- Blue|Smash - A Bluetooth Pentest Suite
- Harald Scan - A Bluetooth Scanner for Linux and Mac OS X
- CSRFTester - Cross-Site Request Forgery Vulnerability Tester
- ModSecurity - An Open Source Web Application Firewall Engine
- PDFMiner - Python PDF Parser and Analyzer
- BTS PenTesting Lab - Vulnerable Web Application For Practicing Penetration Testing
- Flunym0us - Vulnerability Scanner For WordPress and Moodle
- Fiddler - Free Web Debugging Proxy
- Capstone - Multi-Platform Disassembly Framework
- GDB - The GNU Project Debugger
- FuzzDB - Comprehensive Set Of Known Attack Sequences
- SecLists - The Pentesters Companion
- Cansina - Web Content Discovery Tool
- GoatDroid - Self-Contained Android Pentesting Environment
- ike-scan - Tool For Discovering, Fingerprinting, & Testing IPsec VPN Systems
- Wapiti - Web Application Vulnerability Scanner
- Wireless Attack Toolkit - A Push-button Wireless Hacking & Man-In-The-Middle Attack Toolkit
- SQL Injection Test Environment - A Collection Of Web Pages Vulnerable To SQL Injection
- MKBRUTUS - A Password Bruteforcer For MikroTik Devices or Boxes Running RouterOS
- NoSQLMap - Automated Mongo Database & NoSQL Web Application Exploitation Tool
from Effect Hacking full article here