The following is a list of planned updates and improvements.
Feel free to contribute by implementing any feature from the list!
This project is created strictly for educational and research purposes to demonstrate how password cracking techniques work in a controlled, legal environment.
Do not use this tool for unauthorized access to systems, networks, or accounts.
Any misuse of this code may violate applicable laws and could result in severe penalties.
The author takes no responsibility for any illegal or unethical use of this tool.
Always ensure you have explicit permission before testing security on any system.
- Basic Brute Force (Alphabets only, fixed length)
- Dictionary Attack (from file)
- Hash Comparison (MD5/SHA1/SHA256 using OpenSSL or own implementation)
- Hybrid Attack (Append/prepend numbers to words)
- Rainbow Table Lookup (build and search simple rainbow tables)
- Rule-based Attacks (basic rules like capitalization, 1337 speak)
π‘ Add Hash Formats: bcrypt, NTLM
- Basic HTTP Login Brute Force (test dummy web server locally)
- Credential Stuffing with Proxy Support
- FTP/SSH Brute Force using libraries like libssh or raw sockets
- Password Spraying Logic
- Phishing Simulation with Key Capture