https://github.com/rek7/descrypt-cpu-collision-cracker
DEScrypt CPU Collision Cracker
https://github.com/rek7/descrypt-cpu-collision-cracker
collision cracker crypt des descrypt hash high-performance linux-app password-cracker rainbow-table salt
Last synced: 4 months ago
JSON representation
DEScrypt CPU Collision Cracker
- Host: GitHub
- URL: https://github.com/rek7/descrypt-cpu-collision-cracker
- Owner: rek7
- License: mit
- Created: 2018-01-25T20:57:07.000Z (about 8 years ago)
- Default Branch: master
- Last Pushed: 2019-04-14T17:26:06.000Z (almost 7 years ago)
- Last Synced: 2025-04-30T17:50:34.723Z (10 months ago)
- Topics: collision, cracker, crypt, des, descrypt, hash, high-performance, linux-app, password-cracker, rainbow-table, salt
- Language: C++
- Size: 170 KB
- Stars: 50
- Watchers: 5
- Forks: 15
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# DEScrypt-CPU-Collision-Cracker
## What is DEScrypt-CPU-Collision-Cracker?
A linux based high performance DEScrypt CPU cracker written in c++, it deduces the salt and uses a password list to crack hashes.
### Why not use a rainbow table?
DEScrypt uses by default a two byte salt(comprised of characters [a-zA-Z0-9./] [1]) which would mean that you would need to produce roughly 65,536 unique rainbow tables, as a result its more efficient to use collision cracking to find out the plaintext password.
## Features
+ Ability to crack hashes both from a file and individually
+ Detects CPU cores
+ Adjustable number of threads
+ Colon-separated output file
+ Clear readable display
+ Average hash rate of 22,000/s with the default 10 threads on a single CPU core
## Commands
Command Description
------- -----------
-l= File Location of HashList
-i= Individual Hash
-w= File Location of Wordlist
-o= File Location of Output File
-t= Number of Threads(Default is 10)
## Getting started
###### To Compile: g++ -std=c++11 src/main.cpp -pthread -lcrypt -O2 -o DEScrypt
## Screenshots



## Featured on:
[Kitploit](https://www.kitploit.com/2018/01/descrypt-cpu-collision-cracker-descrypt.html)
## Citations
[1] - http://man7.org/linux/man-pages/man3/crypt.3.html