def test_disable_symbols(self): symbols = True for pw in brute(symbols=False): if '!' in pw: symbols = False self.assertTrue(symbols)
def test_disable_numbers(self): numbers = True for pw in brute(numbers=False): if '1' in pw: numbers = False self.assertTrue(numbers)
def test_disable_letters(self): letters = True for pw in brute(letters=False): if 'a' in pw: letters = False self.assertTrue(letters)
def test_enable_spaces(self): spaces = False for pw in brute(spaces=True): if ' ' in pw: spaces = True self.assertTrue(spaces)
def test(x, y, numbers): b = brute(x, y, numbers) s = solution(x, y, numbers) if b != s: print("Failed for x=", x, " y=", y, " numbers=", numbers, " got=", s, " but expected=", b) raise "Falied test"
def demo(): for trystr in brute(start_length=3, length=5, letters=False, numbers=True, symbols=True, spaces=True): print(trystr)
def run_cracker(length, letters, numbers, symbols, salt, pwd): print("Algorithm is running.......") count = 0 start = time.time() for i in brute(length=length, letters=letters, numbers=numbers, symbols=symbols): count += 1 if hashlib.sha256(salt.encode() + i.encode()).hexdigest() == pwd: finish = time.time() print('Password found to be: ' + i + ', Attempts: ' + str(count) + ", Time : " + str(finish - start)) break
def run_cracker(length, letters, numbers, symbols, salt, pwd): print("Algorithm is running.......") count = 0 start = time.time() for i in brute(length=length, letters=letters, numbers=numbers, symbols=symbols): count += 1 if hashlib.sha256(salt.encode() + i.encode()).hexdigest() == pwd: end = time.time() print('Password found to be: ' + i) print('Attempts') print(count) print('Time') print(end - start) continue
def begin(): # The path to the cppcryptfs executable # Example: C:/Users/User/cppcryptfs.exe exe = '' # Add the path to the encrypted directory between the empty quotes # Example: C:\\Users\\User\\some-folder arg = ' --mount="" --drive=a --password='******'' # If you know the ending of the password end = '' password = begin + temp + end command = exe + arg + '\"' + password + '\"' print(command) os.system(command)
def bruteRC4(secret, keyMaxLen, regPattern): tStart = time.time() print('[*] Preparing brute list') brute_list = list(chunks(list(brute(length=keyMaxLen)), CHUNKS_NUM)) pool = multiprocessing.Pool(POOL_SIZE) manager = multiprocessing.Manager() event = manager.Event() print('[*] Start brute force') for b in brute_list: pool.apply_async(_bruteRC4, (b, secret, regPattern, event)) pool.close() event.wait() pool.terminate() print('[*] found a result in %f s' % (time.time() - tStart))
def test_letters_numbers_symbols_whitespace_default(self): letters = False numbers = False symbols = False whitespace = True for pw in brute(): if 'a' in pw: letters = True elif '1' in pw: numbers = True elif '!' in pw: symbols = True elif ' ' in pw: whitespace = False self.assertTrue(letters) self.assertTrue(numbers) self.assertTrue(symbols) self.assertTrue(whitespace)
def main(): """ Main program driver; AKA break the things :return: """ reqr = Reqr(delay=0.05) # Make requests with a 50 ms delay unwanted = ['#','?'] try: for comb in brute(length=7, ramp=False, letters=True, numbers=True, symbols=True, spaces=False): skip = False for char in unwanted: if char in comb: skip = True if skip: continue start_new_thread(reqr.makeReq,(comb,)) # Spawn new thread for each request sleep(reqr.isc.delay) # Rate limiting print(reqr.hits) # if this ever finishes, print the dictionary except: # Should only happen on keyboard interrupts or failures print(reqr.hits) # emergency dictionary dump
def initGame(self): self.gameLock.acquire() self.character = character.character() self.brute = brute.brute(self.scene) self.bruteFirstBornTime = 12 self.bruteBornInterval = 18 self.ghosts = {} self.ghostId = 1 self.ghostMax = 3000 self.ghostBornInterval = 2.6 self.balls = {} self.submachineBullets = props.props() self.sniperBullets = props.props() self.medicines = props.props() self.gameTime = 0 self.gameResult = 0 # 0 for playing, 1 for win, 2 for lose self.level = 0 self.killBrute = 0 self.maxLevel = 5 self.gateMaxHp = 8000 self.gateHp = self.gateMaxHp self.gameLock.release()
def crack(self, filename, pwd_start_len, pwd_len): start_time = time() file = rarfile.RarFile(filename) dict = list( brute(start_length=pwd_start_len, length=pwd_len, letters=True, numbers=True, symbols=False, spaces=False)) word_sum = len(dict) + 1 for (i, word) in enumerate(dict): avg_time_per_iter = (time() - start_time) / (i + 1) time_left = (word_sum - i) * avg_time_per_iter time_passed = time() - start_time hours_left, minutes_left, seconds_left = self.format_time( time_left) hours_passed, minutes_passed, seconds_passed = self.format_time( time_passed) persent = round(((i + 1) / word_sum) * 100, 2) print( "{:05.2f}% | passed: {:02.0f}:{:02.0f}:{:02.0f} | left: {:02.0f}:{:02.0f}:{:02.0f} | {:.2f} it/s | {}" .format(persent, hours_passed, minutes_passed, seconds_passed, hours_left, minutes_left, seconds_left, 1 / avg_time_per_iter, word)) try: file.extractall(pwd=word, path='./extract') print('\nCracked: {}'.format(word)) savefile = open('cracked_files.txt', 'a+') savefile.write('{}:"{}":{:02.0f}:{:02.0f}:{:02.0f}\n'.format( filename, word, hours_passed, minutes_passed, seconds_passed)) break except rarfile.RarWrongPassword: pass except: raise Exception('Unknown exception')
import string from brute import brute #gets salt, hash, and user input f = open("pwd.txt", "r") pwd = f.read() username, salt, hashed_pw = pwd.split(',') pw_length = int(input('What is the length of the password? ')) level = input('Which level of cracking do you want? (1, 2, 3, 4)\n') #start of all the levels if level == '1': counter = 0 start = time.time() for x in brute(length=pw_length, letters=True, numbers=False, symbols=False): if x.islower(): counter += 1 if hashlib.sha256(salt.encode() + x.encode()).hexdigest() == hashed_pw: end = time.time() print('Found password: '******'%s %d tries' % ('In', counter)) print('%s %f seconds' % ('Completed in', end - start)) #print('ONE WORKS') break if level == '2': counter = 0 start = time.time()
import string from brute import brute # read from pwd.txt f = open("pwd.txt", "r") pwd = f.read() username, salt, hashed_password = pwd.split(',') #pick a brute algorithm Options = raw_input('Pick from choices 1, 2, 3, 4 to use for brute. \n') #option 1 if Options == '1': count = 0 start = time.time() for s in brute(length=3, letters=True, numbers=False, symbols=False): if s.islower(): count += 1 if hashlib.sha256(salt.encode() + s.encode()).hexdigest() == hashed_password: end = time.time() print('Password found: ' + s) print('Attempts: ') print(count) print('Runtime:') print(end - start) continue #option 2 if Options == '2': count1 = 0 start = time.time()
from brute import brute from pwn import * from hashlib import md5 import numpy as np bru = 25 best_imgs = dict() for p in xrange(1): for r in xrange(1): for k in xrange(bru): conn = remote('localhost', 29281) salt = conn.recvn(12) for i in brute(length=6, ramp=False): if True: print('Broke md5 with ' + i) conn.send(i) break c1 = np.ones((240, 320), np.float32) * (k) c2 = np.ones((240, 320), np.float32) * (r) c3 = np.ones((240, 320), np.float32) * (p) img = np.array([c1, c2, c3]) #img = img / img.max() print("Sending whole image", k, r, p) conn.send(img) print("Receiving?") resp = conn.recvline() print(resp) if "BAD" not in resp: best_imgs[(k, r, p)] = img print(best_imgs.keys()) f = open("keys.txt", 'w')
def test_ramp_bad_start_length(self): for pw in brute(start_length=0, length=3, ramp=True): self.assertTrue(len(pw) >= 1) for pw in brute(start_length=4, length=3, ramp=True): self.assertTrue(len(pw) < 4)
t5.join() t6.join() divev() deviv() print "\n\033[97;1m ==[ \033[96;1m Selesai......\033[97;1m ]== \n" if __name__ == '__main__': try: os.system('cls' if os.name == 'nt' else 'clear') print baner pil = raw_input( "\033[96;1m {\033[95;1m?\033[96;1m}\033[92;1m Pilih Opsi\033[93;1m : " ) if pil == '1': brute() elif pil == '2': user_dev() run() elif pil == '3': try: print " \n\n \033[97;1m +++[ \033[96;1m Tools Versi 0.2 \033[97;1m ]+++" print " \n \033[93;1m Keunggulan:\n\n \033[97;1m Lebih Power Full dibanding yg V.01 \n bisa mengisi lebih dari 1 password \n" print " \n\033[95;1m Silahkan Ikuti Instagram saya \033[96;1m(rhyfall)" raw_input( " \033[97;1m Tekan Enter Untuk Membuka Instagram..") subprocess.check_output( ['am', 'start', 'https://www.instagram.com/rhyfall/']) os.system('multi_dev.py' if os.name == 'nt' else 'python2 multi_dev.py') except KeyboardInterrupt:
parsed_input = input_entered.split() a = [int(el) for el in parsed_input] print() print("Length of input is: {0}".format(len(a))) print("Sum of input array: {0}".format(sum(a))) # Check is it worth? if (sum(a)) < 0: print("Result: {0}".format(0)) print("Indexes: ({0}, {1})".format(-1, -1)) exit() # Run algorithms. max_brute, indexes, time_brute = brute(a) max_better, time_better = better(a) # The divide and conquer algorithm is recursive. # In order to measure elapsed wall clock time, I measured in here. start = time.time() max_conquer = div_and_conq(a, 0, len(a) - 1) end = time.time() # Print all results calcualted. print() print("--------------------- Brute Force Results --------------------------") print("Result: {0}".format(max_brute)) print("Starting Index: {0}".format(indexes[0])) print("Ending Index: {0}".format(indexes[1])) print("Elapsed Time: {0} seconds".format(time_brute))
filename = input('no such file, please enter a valid filename: ') mode = '' while mode != 'dictionary' and mode != 'brute': mode = input("Please select a working mode [dictionary/brute]: ") pwdGen = None if mode == 'dictionary': dic_name = input("Please enter the filename of the dictionary: ") while not os.path.isfile(dic_name): dic_name = input("no such file, please enter a valid filename: ") pwdGen = fromdictionary(dic_name) if mode == 'brute': letters = input("Include letters? [yes/no] (default yes) ") != 'no' symbols = input("Include symbols? [yes/no] (default yes) ") != 'no' numbers = input("Include numbers? [yes/no] (default yes) ") != 'no' spaces = input("Include spaces? [yes/no] (default no) ") == 'yes' start_length = int(input("min length: ")) length = int(input("max length: ")) pwdGen = brute(start_length=start_length, length=length, letters=letters, numbers=numbers, symbols=symbols, spaces=spaces) print('Start cracking') print('This may take some time, please wait...') crackrar(filename, pwdGen)
def test_brute_length_default(self): last_str = '' for pw in brute(): last_str = pw self.assertEqual(len(last_str), 3)
from brute import brute from pwn import * from hashlib import md5 import numpy as np from scipy.ndimage import imread conn = remote('localhost', 29281) # server connection #conn = remote('40.117.46.42', 29281) # ctf server connection salt = conn.recvn(12) # get part of string from server for i in brute(length=6, ramp=False): # generated second part of string if md5(salt+i).digest().startswith('\x00\x00\x00'): # get 3 nulls at beginning of hash print('Broke md5 with ' + i) conn.send(i) # send second part of string break # and stop the brute forcing img = imread("plaid/wallpaper_20090122104623_19095694832.jpg").astype(np.float32) # plaid image via google image search img = img.transpose((2, 0, 1)) # Keras accepts (CxWxH) images, not the standard (WxHxC) img = img.copy(order='C') # get data into contiguous, C-styled data block print("Sending whole image") conn.send(img) # send image to server. it is already in format to send RGB channels in that order print("Receiving key?") print(conn.recvline()) # get the key!
def test_ramp(self): for pw in brute(length=3, ramp=False): self.assertEqual(len(pw), 3)
from unrar import rarfile from brute import brute # Iterate over *only* numbers (0 - 9). for s in brute(start_length=4, length=4, letters=False, numbers=True, symbols=False): print(s) #r = rarfile.RarFile('./second.rar') #r.printdir() #r.extractall(pwd='koko')
for password in passwords: try: #print(password) rar.extractall(pwd=password) print("File extracted.") print("Password is %s" % password) found = True break except RuntimeError as e: #os.system('cls') #count = count + 1 #N = int(count / (10**4) *100) #print("This may take some time, please wait...") #print("["+ '*'*N + ' '*(100-N) + "]") #print("Wrong password %s" % password) pass if not found: print("Password has not been found.") if __name__ == '__main__': filename = './third.rar' print("Start brute process") pwds = brute(start_length=4, length=4, letters=False, numbers=True, symbols=False, spaces=False) print("This may take some time, please wait...") bruteRar(filename, pwds)
def primeTest(n): if brute(n): return True return False
def test_ramp_start_length(self): for pw in brute(start_length=2, length=3, ramp=True): self.assertTrue(len(pw) >= 2)
from brute import distinct_powers_count as brute from solution import distinct_powers_count as solution if __name__ == "__main__": for n in range(100): b = brute(n) s = solution(n) if b != s: print(n, ":", b, s)
#!/bin/python3 from solution import sum_xor as solution from brute import sum_xor as brute if __name__ == "__main__": for n in range(1, 5000): a, b = solution(n), brute(n) if a != b: print(n, a, b)
from pwn import * from brute import brute # enc_hash = "CD04302CBBD2E0EB259F53FAC7C57EE2" enc_hash = "cd04302cbbd2e0eb259f53fac7c57ee2" counter = 0 for i in brute(length=5, letters=True, numbers=True, symbols=False): m1 = util.hashes.md5sumhex(i) m2 = util.hashes.md5sumhex(m1) m3 = util.hashes.md5sumhex(m2) m4 = util.hashes.md5sumhex(m3) m5 = util.hashes.md5sumhex(m4) m6 = util.hashes.md5sumhex(m5) m7 = util.hashes.md5sumhex(m6) m8 = util.hashes.md5sumhex(m7) m9 = util.hashes.md5sumhex(m8) m10 = util.hashes.md5sumhex(m9) if (counter%100000) == 0: print "[*] counter: " + str(counter) print "[+] " + i print "[-] " + m10 if m10 == enc_hash: print "[!] flag: " + i break counter += 1
#!/usr/bin/env python #brute library 'pip install brute' #requests library 'pip install requests' from brute import brute import os import requests print(("""\ _____________ ___ __ __ / ___/ ___/ _ \/ _ )______ __/ /____ / _/__ ___________ / (_ / /__/ ___/ _ / __/ // / __/ -_) _/ _ \/ __/ __/ -_) \___/\___/_/ /____/_/ \_,_/\__/\__/_/ \___/_/ \__/\__/ """)) google_storage = 'https://storage.googleapis.com/' for x in brute(length=6, letters=True, numbers=False, symbols=False): h = requests.head(google_storage + x) print('Attempting Bucket Name: ' + x) print(h.headers['content-length'])
def test_brute_returns_generator(self): self.assertIsInstance(brute(), GeneratorType)