Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/byt3n33dl3/neopard

Standalone Passwords and Credential candidate generator using the PRINCE and LEOPARD algorithm
https://github.com/byt3n33dl3/neopard

hashcat passwordcracking

Last synced: 15 days ago
JSON representation

Standalone Passwords and Credential candidate generator using the PRINCE and LEOPARD algorithm

Awesome Lists containing this project

README

        

# Neopard

Standalone password and Credentials candidate generator using the PRINCE and LEOPARD algorithm. The name PRINCE is used as an acronym and stands for Probability Infinite Chained Elements, which are the building Blocks of the algorithm

# Brief description

The Neopard is a password candidate generator and can be thought of as an advanced combinator attack. Rather than taking as input two different wordlists and then outputting all the possible two word combinations though, princeprocessor only has one input wordlist and builds "chains" of combined words. These chains can have 1 to N words from the input wordlist concatenated together. So for example if it is outputting guesses of length four, it could generate them using combinations from the input wordlist such as:

- 4 letter word
- 2 letter word + 2 letter word
- 1 letter word + 3 letter word
- 3 letter word + 1 letter word
- 1 letter word + 1 letter word + 2 letter word
- 1 letter word + 2 letter word + 1 letter word
- 2 letter word + 1 letter word + 1 letter word
- 1 letter word + 1 letter word + 1 letter word + 1 letter word

Detailed description
--------------

I'm going to write a detailed description in case I'm extremely bored. Till that, use the following resources:

> - My talk about princeprocessor on Passwords^14 conference in Trondheim, Norway. Slides: [here](https://hashcat.net/events/p14-trondheim/prince-attack.pdf)

> - Thanks to Matt Weir && hashcat, they made a nice analysis of PRINCE && Neopard. You can find the post on his blog: [here](http://reusablesec.blogspot.de/2014/12/tool-deep-dive-prince.html)

Compile
--------------

Simply run make

Binary distribution
--------------

Binaries for Linux, Windows and OSX: https://github.com/pxcs/Neopard/releases