예제 #1
0
 os.remove("md4_hash.txt")
 os.remove("md5_hash.txt")
 os.remove("doublemd5_hash.txt")
 os.remove("sha1_hash.txt")
except:
 blub="foo"

line = f.readline()

while line:
    #lm
    addHashtoFile("lm", smbpasswd.lmhash(line.rstrip('\n\r')).lower())
    #ntlm
    addHashtoFile("ntlm", hashlib.new('md4', line.rstrip('\n\r').encode('utf-16le')).hexdigest())
    #mysql323
    addHashtoFile("mysql323", mysql323.encrypt( line.rstrip('\n\r')))
    #mysqlsha1
    addHashtoFile("mysqlsha1",  hashlib.sha1( hashlib.sha1(line.rstrip('\n\r')).digest()).hexdigest())
    #md4
    addHashtoFile("md4", hashlib.new('md4', line.rstrip('\n\r')).hexdigest())
    #md5    
    addHashtoFile("md5", hashlib.md5(line.rstrip('\n\r')).hexdigest())
    #doublemd5
    addHashtoFile("doublemd5", hashlib.md5(hashlib.md5(line.rstrip('\n\r')).digest()).hexdigest())
    #sha1
    addHashtoFile("sha1", hashlib.sha1(line.rstrip('\n\r')).hexdigest())

    line = f.readline()
f.close()

예제 #2
0
print(P + "........................." + W + " Hash Generator " + P +
      "...........................\n")

try:
    x = raw_input(B + "[" + W + "+" + B + "] " + G + "String " + B + ": " + W)
except NameError:
    print(R + "\n[" + W + "!" + R + "] " + G + "use " + W + "python2.7\n")
    quit()

print(B + "[" + W + "!" + B + "] " + G + "Generate Hash " + W + ". . . ." + G +
      " Please Wait !!!" + W)
time.sleep(0.5)

# mysql1323
from passlib.hash import mysql323
mysql1323 = mysql323.encrypt(x)
print(R + "\n[" + W + "01" + R + "] " + G + "MySQL 3.2.3         " + B + ": " +
      W + mysql1323)

# mysql141
from passlib.hash import mysql41
mysql141 = mysql41.encrypt(x)
print(R + "[" + W + "02" + R + "] " + G + "MySQL 4.1           " + B + ": " +
      W + mysql141)

# mssql2000
from passlib.hash import mssql2000 as m20
mssql2000 = m20.encrypt(x)
print(R + "[" + W + "03" + R + "] " + G + "MSSQL 2000          " + B + ": " +
      W + mssql2000)
예제 #3
0
def hash():
    banner()

    hash_str = raw_input(B + "[" + W + "?" + B + "]" + G + " Hash : " + W)
    #	time.sleep(0.5)
    print(B + "[" + R + "=" + B + "] " + G + "Cek Hash Type ...")
    #	time.sleep(1)

    # Contoh Hash nya , nb : jangan di ubah ntar error

    SHA512 = (
        'dd0ada8693250b31d9f44f3ec2d4a106003a6ce67eaa92e384b356d1b4ef6d66a818d47c1f3a2c6e8a9a9b9bdbd28d485e06161ccd0f528c8bbb5541c3fef36f'
    )
    md = ('ae11fd697ec92c7c98de3fac23aba525')
    sha1 = ('4a1d4dbc1e193ec3ab2e9213876ceb8f4db72333')
    sha224 = ('e301f414993d5ec2bd1d780688d37fe41512f8b57f6923d054ef8e59')
    sha384 = (
        '3b21c44f8d830fa55ee9328a7713c6aad548fe6d7a4a438723a0da67c48c485220081a2fbc3e8c17fd9bd65f8d4b4e6b'
    )
    sha256 = (
        '2c740d20dab7f14ec30510a11f8fd78b82bc3a711abe8a993acdb323e78e6d5e')
    mysql1323 = ("5d2e19393cc5ef67")
    mysql41 = ("*88166B019A3144C579AC4A7131BCC3AD6FF61DA6")
    mssql2000 = (
        "0x0100DE9B3306258B37432CAC3A6FB7C638946FA393E09C9CBC0FA8C6E03B803390B1C3E7FB112A21B2304595D490"
    )
    mssql2005 = ('0x01008110620C7BD03A38A28A3D1D032059AE9F2F94F3B74397F8')

    if len(hash_str) == len(mysql1323) and hash_str.isdigit(
    ) == False and hash_str.isalpha() == False and hash_str.isalnum() == True:
        print(B + "[" + R + "=" + B + "] " + G + "hash type : " + W +
              "mysql 3.2.3")
        hash = "mysql1323"

    elif len(hash_str) == len(mysql41) and "*" in hash_str:
        print(B + "[" + R + "=" + B + "] " + G + "hash type : " + W +
              "mysql 4.1")
        hash = "mysql41"

    elif len(hash_str) == len(mssql2000) and "0x0" in hash_str:
        print(B + "[" + R + "=" + B + "] " + G + "hash type : " + W +
              "Mssql2000")
        hash = "mssql2000"

    elif len(hash_str) == len(mssql2005) and "0x0" in hash_str:
        print(B + "[" + R + "=" + B + "] " + G + "hash type : " + W +
              "Mssql2005")
        hash = "mssql2005"

    elif len(hash_str) == len(SHA512) and hash_str.isdigit(
    ) == False and hash_str.isalpha() == False and hash_str.isalnum() == True:
        print(Y + "   [" + W + "01" + Y + "] " + C + "sha512")
        print(Y + "   [" + W + "02" + Y + "] " + C + "whirlpool")
        #		time.sleep(0.3)
        cek = raw_input(B + "[" + W + "?" + B + "] " + G + "Choose hash " + Y +
                        ">>> " + W)

        if cek == "1" or cek == "01" or cek == "sha512":
            hash = "sha512"
        elif cek == "2" or cek == "02" or cek == "whirlpool":
            hash = "whirlpool"
        else:
            print(R + "[" + W + "!" + R + "] " + G + "Exiting ... \n")
            #                       time.sleep(0.5)
            sys.exit()

    elif len(hash_str) == len(md) and hash_str.isdigit(
    ) == False and hash_str.isalpha() == False and hash_str.isalnum() == True:

        print(Y + "   [" + W + "01" + Y + "] " + C + "md4")
        print(Y + "   [" + W + "02" + Y + "] " + C + "md5")
        print(Y + "   [" + W + "03" + Y + "] " + C + "Nthash")
        print(Y + "   [" + W + "04" + Y + "] " + C + "Lmhash")
        print(Y + "   [" + W + "05" + Y + "] " + C + "Ntlm hash")

        #		time.sleep(0.3)
        cek = raw_input(B + "[" + W + "?" + B + "] " + G + "Choose Hash " + Y +
                        ">>> " + W)

        if cek == "1" or cek == "01" or cek == "md4" or cek == "MD4" or cek == "Md4":
            hash = "md4"
        elif cek == "2" or cek == "02" or cek == "md5" or cek == "MD5" or cek == "Md5":
            try:
                print(B + "[" + R + "=" + B + "] " + G + "open google")
                #				time.sleep(0.3)
                print(B + "[" + W + "*" + B + "] " + G + "Start ...")
                #				time.sleep(0.3)
                start = ("00:00:00")
                start1 = time.time()
                print(B + "\n[" + W + "{}" + B + "] " + G + "Searching..." +
                      Y).format(start)

                data = urlencode({"md5": hash_str, "x": "21", "y": "8"})
                html = urlopen(
                    "http://md5.my-addr.com/md5_decrypt-md5_cracker_online/md5_decoder_tool.php",
                    data)
                find = html.read()
                match = search(
                    r"<span class='middle_title'>Hashed string</span>: [^<]*</div>",
                    find)
                if match:

                    end = time.strftime("%H:%M:%S",
                                        time.gmtime(time.time() - start1))
                    print(B + "[" + W + "{}" + B + "] " + G +
                          "Stopped...").format(end)
                    #	                                time.sleep(0.3)
                    print(B + "\n[" + W + "=" + B + "]" + G +
                          " password found ")
                    print(B + "[" + W + "+" + B + "] " + W + (hash_str) + Y +
                          " 0={==> " + W +
                          (match.group().split('span')[2][3:-6]) + "\n")
                    sys.exit()
                else:
                    data = urlencode({"md5": hash_str, "x": "21", "y": "8"})
                    html = urlopen(
                        "http://md5.my-addr.com/md5_decrypt-md5_cracker_online/md5_decoder_tool.php",
                        data)
                    find = html.read()
                    match = search(
                        r"<span class='middle_title'>Hashed string</span>: [^<]*</div>",
                        find)
                    if match:

                        end = time.strftime("%H:%M:%S",
                                            time.gmtime(time.time() - start1))
                        print(B + "[" + W + "{}" + B + "] " + G +
                              "Stopped...").format(end)
                        #						time.sleep(0.3)
                        print(B + "\n[" + W + "=" + B + "]" + G +
                              " password found ")
                        print(B + " [" + W + "+" + B + "] " + W + hash_str +
                              Y + " 0={==> " + W +
                              match.group().split('span')[2][3:-6] + W + " \n")
                        sys.exit()
                    else:
                        url = "http://www.nitrxgen.net/md5db/" + hash_str
                        cek = urlopen(url).read()
                        if len(cek) > 0:

                            end = time.strftime(
                                "%H:%M:%S", time.gmtime(time.time() - start1))
                            print(B + "[" + W + "{}" + B + "] " + G +
                                  "Stopped...").format(end)
                            #							time.sleep(0.3)
                            print(B + "\n[" + W + "=" + B + "]" + G +
                                  " password found ")
                            print(B + "[" + W + "+" + B + "] " + W + hash_str +
                                  Y + " 0={==> " + W + cek + "\n")
                            sys.exit()
                        else:

                            end = time.strftime(
                                "%H:%M:%S", time.gmtime(time.time() - start1))
                            print(B + "[" + W + "{}" + B + "]" + G +
                                  " password not found\n").format(end)
                            hash = "md5"

            except IOError:

                end = time.strftime("%H:%M:%S",
                                    time.gmtime(time.time() - start1))
                print(B + "[" + W + "{}" + B + "]" + G +
                      " Timeout\n").format(end)
                hash = "md5"

        elif cek == "03" or cek == "3" or cek.upper() == "NTHASH":
            hash = "nthash"

        elif cek == "04" or cek == "4" or cek.upper() == "LMHASH":
            hash = "lmhash"

        elif cek == "05" or cek == "5" or cek.upper() == "NTLM":
            hash = "ntlm"

        else:
            print(R + "[" + W + "!" + R + "] " + G + "Exiting ... \n" + W)
            #			time.sleep(0.5)
            sys.exit()

    elif len(hash_str) == len(sha1) and hash_str.isdigit(
    ) == False and hash_str.isalpha() == False and hash_str.isalnum() == True:

        print(Y + "   [" + W + "01" + Y + "] " + C + "sha1")
        print(Y + "   [" + W + "02" + Y + "] " + C + "ripemd160")
        #		time.sleep(0.3)
        cek = raw_input(B + "[" + W + "?" + B + "] " + G + "Choose Hash " + Y +
                        ">>> " + W)

        if cek == "1" or cek == "01" or cek == "sha1" or cek == "SHA1" or cek == "Sha1":
            #			time.sleep(0.5)
            print(B + "[" + R + "=" + B + "] " + G + "open google")
            #			time.sleep(0.3)
            print(B + "[" + W + "*" + B + "] " + G + "Start ...")
            #			time.sleep(0.3)
            start = ("00:00:00")
            start1 = time.time()
            print(B + "\n[" + W + "{}" + B + "] " + G + "Searching..." +
                  Y).format(start)
            try:

                data = urlencode({
                    "auth": "8272hgt",
                    "hash": hash_str,
                    "string": "",
                    "Submit": "Submit"
                })
                html = urlopen("http://hashcrack.com/index.php", data)
                find = html.read()
                match = search(
                    r'<span class=hervorheb2>[^<]*</span></div></TD>', find)
                if match:

                    end = time.strftime("%H:%M:%S",
                                        time.gmtime(time.time() - start1))
                    print(B + "[" + W + "{}" + B + "] " + G +
                          "Stopped...").format(end)
                    #					time.sleep(0.3)
                    print(B + "\n[" + W + "=" + B + "]" + G +
                          " password found ")
                    print(B + "[" + W + "+" + B + "] " + W + hash_str + Y +
                          " 0={==> " + W +
                          match.group().split('hervorheb2>')[1][:-18] + "\n")
                    sys.exit()

                else:

                    end = time.strftime("%H:%M:%S",
                                        time.gmtime(time.time() - start1))
                    print(B + "[" + W + "{}" + B + "]" + G +
                          " password not found\n").format(date)
                    hash = "sha1"
            except IOError:

                end = time.strftime("%H:%M:%S",
                                    time.gmtime(time.time() - start1))
                print(B + "[" + W + "{}" + B + "]" + G +
                      " Timeout\n").format(end)
                hash = "sha1"

        elif cek == "2" or cek == "02" or cek == "ripemd160":
            hash = 'ripemd160'
        else:
            print(R + "[" + W + "!" + R + "] " + G + "Exiting ... \n" + W)
            #			time.sleep(0.5)
            sys.exit()

    elif len(hash_str) == len(sha224) and hash_str.isdigit(
    ) == False and hash_str.isalpha() == False and hash_str.isalnum() == True:
        print(B + "[" + R + "=" + B + "] " + G + "hash type : " + W + "SHA224")
        hash = "SHA224"

    elif len(hash_str) == len(sha384) and hash_str.isdigit(
    ) == False and hash_str.isalpha() == False and hash_str.isalnum() == True:
        print(B + "[" + R + "=" + B + "] " + G + "hash type : " + W + "SHA384")
        hash = "SHA384"

    elif len(hash_str) == len(sha256) and hash_str.isdigit(
    ) == False and hash_str.isalpha() == False and hash_str.isalnum() == True:
        print(B + "[" + R + "=" + B + "] " + G + "hash type : " + W + "sha256")
        #		time.sleep(0.5)
        print(B + "[" + R + "=" + B + "] " + G + "open google")
        #		time.sleep(0.3)
        print(B + "[" + W + "*" + B + "] " + G + "Start ...")
        #		time.sleep(0.3)
        start = ("00:00:00")
        start1 = time.time()
        print(B + "\n[" + W + "{}" + B + "] " + G + "Searching..." +
              Y).format(start)

        try:
            data = urlencode({"hash": hash_str, "decrypt": "Decrypt"})
            html = urlopen("http://md5decrypt.net/en/Sha256/", data)
            find = html.read()
            match = search(r'<b>[^<]*</b><br/><br/>', find)
            if match:

                end = time.strftime("%H:%M:%S",
                                    time.gmtime(time.time() - start1))
                print(B + "[" + W + "{}" + B + "] " + G +
                      "Stopped...").format(end)
                #				time.sleep(0.3)
                print(B + "\n[" + W + "=" + B + "]" + G + " password found ")
                print(B + "[" + W + "+" + B + "] " + W + hash_str + Y +
                      " 0={==> " + W + match.group().split('<b>')[1][:-14] +
                      "\n")
                sys.exit()

            else:

                end = time.strftime("%H:%M:%S",
                                    time.gmtime(time.time() - start1))
                print(B + "[" + W + "{}" + B + "]" + G +
                      " password not found\n").format(end)
                hash = "sha256"
        except IOError:

            end = time.strftime("%H:%M:%S", time.gmtime(time.time() - start1))
            print(B + "[" + W + "{}" + B + "]" + G + " Timeout\n").format(end)
            hash = "sha256"

    else:
        print(R + "[" + W + "!" + R + "] " + G + "Hash error\n" + W)
        sys.exit()

    time.sleep(0.1)
    print(B + "[" + W + "=" + B + "] " + G + "cek wordlist ..")

    try:
        w = open("wordlist.txt", "r").readlines()
        x = len(w)
    except IOError:
        #		time.sleep(0.5)
        print(B + "[" + R + "=" + B + "]" + G + " Can't load " + W +
              "wordlist.txt, " + G + "file not exist\n" + W)
        sys.exit()


#	time.sleep(0.3)
    print(B + "[" + R + "=" + B + "] " + G + "load " + W + "{}" + G +
          " words in " + W + "wordlist.txt").format(x)
    print(B + "[" + W + "*" + B + "] " + G + "start ..\n")
    #	time.sleep(1)

    start = ("00:00:00")
    start1 = time.time()
    print(B + "[" + W + "{}" + B + "] " + G + "Cracking..." + Y).format(start)

    pbar = progressbar.ProgressBar()

    if hash == "mysql1323":

        hash_str = hash_str.lower()
        for line in pbar(w):
            line = line.strip()
            h = m20.encrypt(line)

            if h == hash_str:

                end = time.strftime("%H:%M:%S",
                                    time.gmtime(time.time() - start1))
                #                                time.sleep(0.3)
                print(B + "\n[" + W + "{}" + B + "] " + G +
                      "Stopped...\n").format(end)
                #                                time.sleep(0.3)
                print(B + "[" + W + "=" + B + "]" + G + " password found ")
                print(B + "[" + R + "+" + B + "] " + W + hash_str + Y +
                      " 0={==> " + W + line + W + "\n")
                sys.exit()

        end = time.strftime("%H:%M:%S", time.gmtime(time.time() - start1))
        print(B + "[" + W + "{}" + B + "]" + G + " password not found\n" +
              W).format(end)
        sys.exit()

    elif hash == "lmhash":

        hasb_str = hash_str.upper()
        for line in pbar(w):
            line = line.strip()
            h = lmhash.encrypt(line)
            if h == hash_str:

                end = time.strftime("%H:%M:%S",
                                    time.gmtime(time.time() - start1))
                #                                time.sleep(0.3)
                print(B + "\n[" + W + "{}" + B + "] " + G +
                      "Stopped...\n").format(end)
                #                                time.sleep(0.3)
                print(B + "[" + W + "=" + B + "]" + G + " password found ")
                print(B + "[" + R + "+" + B + "] " + W + hash_str + Y +
                      " 0={==> " + W + line + W + "\n")
                sys.exit()

        end = time.strftime("%H:%M:%S", time.gmtime(time.time() - start1))
        print(B + "[" + W + "{}" + B + "]" + G + " password not found\n" +
              W).format(end)
        sys.exit()

    elif hash == "nthash":

        hasb_str = hash_str.upper()
        for line in pbar(w):
            line = line.strip()
            h = nthash.encrypt(line)

            if h == hash_str:

                end = time.strftime("%H:%M:%S",
                                    time.gmtime(time.time() - start1))
                #                                time.sleep(0.3)
                print(B + "\n[" + W + "{}" + B + "] " + G +
                      "Stopped...\n").format(end)
                #                                time.sleep(0.3)
                print(B + "[" + W + "=" + B + "]" + G + " password found ")
                print(B + "[" + R + "+" + B + "] " + W + hash_str + Y +
                      " 0={==> " + W + line + W + "\n")
                sys.exit()

        end = time.strftime("%H:%M:%S", time.gmtime(time.time() - start1))
        print(B + "[" + W + "{}" + B + "]" + G + " password not found\n" +
              W).format(end)
        sys.exit()

    elif hash == "mysql41":

        hash_str = hash_str.upper()
        for line in pbar(w):
            line = line.strip()
            h = m25.encrypt(line)

            if h == hash_str:

                end = time.strftime("%H:%M:%S",
                                    time.gmtime(time.time() - start1))
                #                                time.sleep(0.3)
                print(B + "\n[" + W + "{}" + B + "] " + G +
                      "Stopped...\n").format(end)
                #                                time.sleep(0.3)
                print(B + "[" + W + "=" + B + "]" + G + " password found ")
                print(B + "[" + R + "+" + B + "] " + W + hash_str + Y +
                      " 0={==> " + W + line + W + "\n")
                sys.exit()

        end = time.strftime("%H:%M:%S", time.gmtime(time.time() - start1))
        print(B + "[" + W + "{}" + B + "]" + G + " password not found\n" +
              W).format(end)
        sys.exit()

    elif hash == "mssql2000":

        hash_str = hash_str.upper()
        for line in pbar(w):
            line = line.strip()
            h = ms20.encrypt(line)

            if h == hash_str:

                end = time.strftime("%H:%M:%S",
                                    time.gmtime(time.time() - start1))
                #                                time.sleep(0.3)
                print(B + "\n[" + W + "{}" + B + "] " + G +
                      "Stopped...\n").format(end)
                #                                time.sleep(0.3)
                print(B + "[" + W + "=" + B + "]" + G + " password found ")
                print(B + "[" + R + "+" + B + "] " + W + hash_str + Y +
                      " 0={==> " + W + line + W + "\n")
                sys.exit()

        end = time.strftime("%H:%M:%S", time.gmtime(time.time() - start1))
        print(B + "[" + W + "{}" + B + "]" + G + " password not found\n" +
              W).format(end)
        sys.exit()

    elif hash == "ntlm":

        hash_str = hash_str.lower()
        for line in pbar(w):
            line = line.strip()
            h = ntlm_hash = binascii.hexlify(
                hashlib.new('md4', line.encode('utf-16le')).digest())
            if h == hash_str:

                end = time.strftime("%H:%M:%S",
                                    time.gmtime(time.time() - start1))
                #				time.sleep(0.3)
                print(B + "\n[" + W + "{}" + B + "] " + G +
                      "Stopped...\n").format(end)
                #                                time.sleep(0.3)
                print(B + "[" + W + "=" + B + "]" + G + " password found ")
                print(B + "[" + R + "+" + B + "] " + W + hash_str + Y +
                      " 0={==> " + W + line + W + "\n")
                sys.exit()

        end = time.strftime("%H:%M:%S", time.gmtime(time.time() - start1))
        print(B + "[" + W + "{}" + B + "]" + G + " password not found\n" +
              W).format(end)
        sys.exit()

    elif hash == "mssql2005":

        hasb_str = hash_str.upper()
        for line in pbar(w):
            line = line.strip()
            h = ms25.encrypt(line)

            if h == hash_str:

                end = time.strftime("%H:%M:%S",
                                    time.gmtime(time.time() - start1))
                #                                time.sleep(0.3)
                print(B + "\n[" + W + "{}" + B + "] " + G +
                      "Stopped...\n").format(end)
                #                                time.sleep(0.3)
                print(B + "[" + W + "=" + B + "]" + G + " password found ")
                print(B + "[" + R + "+" + B + "] " + W + hash_str + Y +
                      " 0={==> " + W + line + W + "\n")
                sys.exit()

        end = time.strftime("%H:%M:%S", time.gmtime(time.time() - start1))
        print(B + "[" + W + "{}" + B + "]" + G + " password not found\n" +
              W).format(end)
        sys.exit()

    else:

        hash_str = hash_str.lower()
        for line in pbar(w):

            line = line.strip()
            h = hashlib.new(hash)
            h.update(line)

            if h.hexdigest() == hash_str:

                end = time.strftime("%H:%M:%S",
                                    time.gmtime(time.time() - start1))
                #				time.sleep(0.3)
                print(B + "\n[" + W + "{}" + B + "] " + G +
                      "Stopped...\n").format(end)
                #				time.sleep(0.3)
                print(B + "[" + W + "=" + B + "]" + G + " password found ")
                print(B + "[" + R + "+" + B + "] " + W + hash_str + Y +
                      " 0={==> " + W + line + W + "\n")
                sys.exit()

        end = time.strftime("%H:%M:%S", time.gmtime(time.time() - start1))
        print(B + "[" + W + "{}" + B + "]" + G + " password not found\n" +
              W).format(end)
        sys.exit()
예제 #4
0
 def mysql3(self, plain):
     return mysql323.encrypt(plain)
예제 #5
0
 def digest(self):
     return unhexlify(mysql323.encrypt(self.data[:64]))
예제 #6
0
 def sql1(self, text):
     from passlib.hash import mysql323
     sql = mysql323.encrypt(text)
     return sql
예제 #7
0
 def digest(self):
     return mysql323.encrypt(self._data[:64]).decode('hex')
예제 #8
0
def hashing(get_input):
    #encoding code for hexadecimal conversion
    encoded_input = get_input.encode()
    print("-" * 80)
    '''
    #md2
    m=MD2.new()
    m.update(get_input)
    print(G+"{+}The MD2 Hash Value Of Your Input Is {+}: "+m.hexdigest())
    '''

    #md4
    m = hashlib.new("md4")
    m.update(get_input)
    md4_hash = m.hexdigest()
    print(G + "{+}The MD4 Hash Value Of Your Input Is {+}: " + Y + md4_hash)

    #md5
    md5_hash = hashlib.md5(encoded_input)
    print(G + "{+}The MD5 Hash Value Of Your Input Is {+}: " + Y +
          md5_hash.hexdigest())

    #md5 crypt
    from passlib.hash import md5_crypt as mc
    md5_crypt = mc.encrypt(get_input)
    print(G + "{+}The MD5 Crypt Hash Value Of Your Input Is {+}: " + Y +
          md5_crypt)

    #sun md5 crypt
    from passlib.hash import sun_md5_crypt as mc
    sunmd5_crypt = mc.encrypt(get_input)
    print(G + "{+}The Sun MD5 Crypt Hash Value Of Your Input Is {+}: " + Y +
          sunmd5_crypt)

    #apache's md5 crypt
    from passlib.hash import apr_md5_crypt as mc
    apachemd5_crypt = mc.encrypt(get_input)
    print(G + "{+}The Apache MD5 Crypt Hash Value Of Your Input Is {+}: " + Y +
          apachemd5_crypt)

    #sha1
    sha1_hash = hashlib.sha1(encoded_input)
    print(G + "{+}The SHA1 Hash Value Of Your Input Is {+}: " + Y +
          sha1_hash.hexdigest())

    #sha224
    sha224_hash = hashlib.sha224(encoded_input)
    print(G + "{+}The SHA224 Hash Value Of Your Input Is {+}: " + Y +
          sha224_hash.hexdigest())

    #sha256
    sha256_hash = hashlib.sha256(encoded_input)
    print(G + "{+}The SHA256 Hash Value Of Your Input Is {+}: " + Y +
          sha256_hash.hexdigest())

    #sha384
    sha384_hash = hashlib.sha384(encoded_input)
    print(G + "{+}The SHA384 Hash Value Of Your Input Is {+}: " + Y +
          sha384_hash.hexdigest())

    #sha512
    sha512_hash = hashlib.sha512(encoded_input)
    print(G + "{+}The SHA512 Hash Value Of Your Input Is {+}: " + Y +
          sha512_hash.hexdigest())

    #sha1 Crypt
    from passlib.hash import sha1_crypt as mc
    sha1 = mc.encrypt(get_input)
    print(G + "{+}The SHA1 Crypt Hash Value Of Your Input Is {+}: " + Y + sha1)

    #sha256 Crypt
    from passlib.hash import sha256_crypt as mc
    sha256_crypt = mc.encrypt(get_input)
    print(G + "{+}The SHA256 Crypt Hash Value Of Your Input Is {+}: " + Y +
          sha256_crypt)

    # Sha512 crypt
    from passlib.hash import sha512_crypt as mc
    sha512_crypt = mc.encrypt(get_input)
    print(G + "{+}The SHA512 Crypt Hash Value Of Your Input Is {+}: " + Y +
          sha512_crypt)

    #django sha1
    from passlib.hash import django_pbkdf2_sha1 as m25
    django_sha1 = m25.encrypt(get_input)
    print(G + "{+}The Django HMAC SHA1 Hash Value Of Your Input Is {+}: " + Y +
          django_sha1)

    #django sha256
    from passlib.hash import django_pbkdf2_sha256 as m25
    django_sha256 = m25.encrypt(get_input)
    print(G + "{+}The Django HMAC SHA256 Hash Value Of Your Input Is {+}: " +
          Y + django_sha256)
    '''
    #ntlm
    ntlm_hash=hashlib.new('md4', "password".encode('utf-16le')).digest()
    print(G+"{+}The NTLM Hash Value Of Your Input Is {+}: "+ntlm_hash)
    '''

    #blake2b
    from pyblake2 import blake2b
    h = blake2b()
    h.update(get_input)
    blake2b_hash = h.hexdigest()
    print(G + "{+}The Blake2b Hash Value Of Your Input Is {+}: " + Y +
          blake2b_hash)

    #blake2s
    from pyblake2 import blake2s
    h = blake2s()
    h.update(get_input)
    blake2s_hash = h.hexdigest()
    print(G + "{+}The Blake2s Hash Value Of Your Input Is {+}: " + Y +
          blake2s_hash)

    #whirlpool
    m = hashlib.new("whirlpool")
    m.update(get_input)
    whirlpool_hash = m.hexdigest()
    print(G + "{+}The Whirlpool Hash Value Of Your Input Is {+}: " + Y +
          whirlpool_hash)

    #ripemd160
    m = hashlib.new("ripemd160")
    m.update(get_input)
    ripemd160_hash = m.hexdigest()
    print(G + "{+}The Ripemd160 Hash Value Of Your Input Is {+}: " + Y +
          ripemd160_hash)

    #crc32
    crc32_value = zlib.crc32(get_input)
    crc32 = '%08X' % (crc32_value & 0xffffffff, )
    print(G + "{+}The CRC32 Hash Value Of Your Input Is {+}: " + Y +
          crc32.lower())

    #adler32
    adler32_value = zlib.adler32(get_input)
    adler32 = '%08X' % (adler32_value & 0xffffffff, )
    print(G + "{+}The Adler32 Hash Value Of Your Input Is {+}: " + Y +
          adler32.lower())

    #des
    from passlib.hash import des_crypt
    des_hash = des_crypt.encrypt(get_input)
    print(G + "{+}The DES Hash Value Of Your Input Is {+}: " + Y + des_hash)

    #bsdicrypt
    from passlib.hash import bsdi_crypt
    bsdi_hash = bsdi_crypt.encrypt(get_input)
    print(G + "{+}The BSDI Hash Value Of Your Input Is {+}: " + Y + bsdi_hash)

    #bigcrypt
    from passlib.hash import bigcrypt
    big_hash = bigcrypt.encrypt(get_input)
    print(G + "{+}The BigCrypt Hash Value Of Your Input Is {+}: " + Y +
          big_hash)

    #crypt16
    from passlib.hash import crypt16
    crypt16_hash = crypt16.encrypt(get_input)
    print(G + "{+}The Crypt16 Hash Value Of Your Input Is {+}: " + Y +
          crypt16_hash)

    #phppass
    from passlib.hash import phpass as mc
    phpass = mc.encrypt(get_input)
    print(G + "{+}The PHPass Hash Value Of Your Input Is {+}: " + Y + phpass)

    #Cryptacular's PBDF2
    from passlib.hash import cta_pbkdf2_sha1 as mc
    cryp_pbkdf2_sha1 = mc.encrypt(get_input)
    print(G + "{+}The Cryptacular's PBDF2 Hash Value Of Your Input Is {+}: " +
          Y + cryp_pbkdf2_sha1)

    #dwayne PBDF2
    from passlib.hash import dlitz_pbkdf2_sha1 as mc
    dwayne_pbkdf2_sha1 = mc.encrypt(get_input)
    print(G + "{+}The Dwayne PBDF2 Hash Value Of Your Input Is {+}: " + Y +
          dwayne_pbkdf2_sha1)

    #Atlassian's PBKDF2 Hash
    from passlib.hash import cta_pbkdf2_sha1 as mc
    atl_pbkdf2_sha1 = mc.encrypt(get_input)
    print(G +
          "{+}The Atlassin's PBKDF2 SHA1 Hash Value Of Your Input Is {+}: " +
          Y + atl_pbkdf2_sha1)

    #grub pbkdf2
    from passlib.hash import grub_pbkdf2_sha512 as m25
    grub_pbkdf2_sha512 = m25.encrypt(get_input)
    print(G + "{+}The Grub PBKDF2 SHA512 Hash Value Of Your Input Is {+}: " +
          Y + grub_pbkdf2_sha512)

    #scram
    from passlib.hash import scram as mc
    scram = mc.encrypt(get_input)
    print(G + "{+}The Scram Hash Value Of Your Input Is {+}: " + Y + scram)

    #freebsd nthash
    from passlib.hash import bsd_nthash as mc
    bsd_nthash = mc.encrypt(get_input)
    print(G + "{+}The BSD1 NTHash Value Of Your Input Is {+}: " + Y +
          bsd_nthash)

    #oracle11
    from passlib.hash import oracle11 as m25
    oracle11 = m25.encrypt(get_input)
    print(G + "{+}The Oracle11G Hash Value Of Your Input Is {+}: " + Y +
          oracle11)

    #lanManager
    from passlib.hash import lmhash as m25
    lmhash = m25.encrypt(get_input)
    print(G + "{+}The LMHash Hash Value Of Your Input Is {+}: " + Y + lmhash)

    #nthash
    from passlib.hash import nthash as m25
    nthash = m25.encrypt(get_input)
    print(G + "{+}The Windows-Nthash Hash Value Of Your Input Is {+}: " + Y +
          nthash)

    #cisco type 7
    from passlib.hash import cisco_type7 as m25
    cisco = m25.encrypt(get_input)
    print(G + "{+}The CISCO Type-7 Hash Value Of Your Input Is {+}: " + Y +
          cisco)

    #fshp
    from passlib.hash import fshp as m25
    fshp = m25.encrypt(get_input)
    print(
        G +
        "{+}The FSHP-Fairly Secured Hashed Password Hash Value Of Your Input Is {+}: "
        + Y + fshp)

    #mysql323
    from passlib.hash import mysql323
    mysql323hash = mysql323.encrypt(get_input)
    print(G + "{+}The MySQL 3.2.3 Hash Value Of Your Input Is {+}: " + Y +
          mysql323hash)

    #mysql41
    from passlib.hash import mysql41
    mysql141hash = mysql41.encrypt(get_input)
    print(G + "{+}The MySQL 4.1 Hash Value Of Your Input Is {+}: " + Y +
          mysql141hash)

    #mssql2000
    from passlib.hash import mssql2000 as m20
    mssql2000hash = m20.encrypt(get_input)
    print(G + "{+}The MS-SQL 2000 Hash Value Of Your Input Is {+}: " + Y +
          mssql2000hash)

    #mssql2005
    from passlib.hash import mssql2005 as m25
    mssql2005hash = m25.encrypt(get_input)
    print(G + "{+}The MS-SQL 2005 Hash Value Of Your Input Is {+}: " + Y +
          mssql2005hash)
예제 #9
0
 def mysql3(self, plain):
     return mysql323.encrypt(plain)