https://github.com/sr-lab/count-expander
A program for re-hydrating password dumps that contain counts.
https://github.com/sr-lab/count-expander
password password-cracking password-dump windows
Last synced: 3 months ago
JSON representation
A program for re-hydrating password dumps that contain counts.
- Host: GitHub
- URL: https://github.com/sr-lab/count-expander
- Owner: sr-lab
- Created: 2018-01-05T17:14:19.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2018-10-25T17:00:26.000Z (over 6 years ago)
- Last Synced: 2025-01-11T15:34:19.882Z (5 months ago)
- Topics: password, password-cracking, password-dump, windows
- Language: C#
- Homepage:
- Size: 16.6 KB
- Stars: 0
- Watchers: 4
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Count Expander
Re-hydrates password lists that contain counts. Also contains a utility that will do the opposite and dehydrate a raw password dump into a file of counts (frequencies) against passwords.## Overview
Some password lists that can be found online are formatted like this:```
75 password1
56 abc123
29 monkey1
28 iloveyou1
24 myspace1
18 number1
18 football1
17 nicole1
17 123456
16 iloveyou2
16 123abc
15 princess1
15 bubbles1
15 blink182
15 babygirl1
...
```This utility "expands" or "rehydrates" these password list back into their full form. For instance:
```
3 password
2 hunter
3 nicole
```Would become:
```
password
password
password
hunter
hunter
nicole
nicole
nicole
```## Usage
Use the utility like this:```
.\CountExpander.exe [unique_only]
```The options are quite straightforward:
| Option | Values | Required? | Description |
|-------------|-------------|-----------|------------------------------------------------------------------|
| in_file | Any | Yes | The dehydrated password file. |
| unique_only | Flag (`-u`) | No | Whether or not to output unique passwords only, defaults to off. |## Compressor
The compressor utility is used in the same way. It will take raw, newline-delimited password list as a file and spit out a file which contains frequencies against passwords. Use it thusly:```
.\CountExpander.Compressor.exe
```The options are quite straightforward:
| Option | Values | Required? | Description |
|-------------|-------------|-----------|------------------------|
| in_file | Any | Yes | The raw password file. |