Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/walderlansena/hashblade
:closed_lock_with_key: Encrypted texts and perform Brute Force. Through Hash MD5, SHA1, SHA256, SHA512.. In all operating systems Gnu/Linux :penguin:, Windows, MacOs :apple:
https://github.com/walderlansena/hashblade
algorithm crack criptography encrypted-texts hash linux macos md5 md5crak md5sum sha1 sha1crack sha1sum sha256 sha256crack sha256sum sha512 sha512crack sha512sum windows
Last synced: about 1 month ago
JSON representation
:closed_lock_with_key: Encrypted texts and perform Brute Force. Through Hash MD5, SHA1, SHA256, SHA512.. In all operating systems Gnu/Linux :penguin:, Windows, MacOs :apple:
- Host: GitHub
- URL: https://github.com/walderlansena/hashblade
- Owner: WalderlanSena
- License: mit
- Created: 2017-11-11T16:41:26.000Z (about 7 years ago)
- Default Branch: master
- Last Pushed: 2017-11-14T06:22:07.000Z (about 7 years ago)
- Last Synced: 2024-04-12T05:14:30.820Z (7 months ago)
- Topics: algorithm, crack, criptography, encrypted-texts, hash, linux, macos, md5, md5crak, md5sum, sha1, sha1crack, sha1sum, sha256, sha256crack, sha256sum, sha512, sha512crack, sha512sum, windows
- Language: C++
- Homepage:
- Size: 2.63 MB
- Stars: 6
- Watchers: 2
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
Hash Blade
:closed_lock_with_key: :hocho: Encrypted texts and perform Brute Force. Through Hash MD5, SHA1, SHA256, SHA512.. In all operating systems Gnu/Linux :penguin:, Windows, MacOs :apple:
Whats is Hash?
Font img: https://www.gta.ufrj.brA hash function is an algorithm that maps variable-length data to fixed-length data. The values returned by a hash function are called hash values, hash codes, hash sums, checksums, or simply hashes.
Whats is Md5?
MD5 is a 128-bit unidirectional cryptographic scatter function developed by RSA Data Security, Inc., described in RFC 1321, and widely used by point-to-point protocol software for file and log integrity checking.
Font img: https://upload.wikimedia.orgWhats is Sha1?
SHA1 implements a keyness hashed algorithm that takes a message up to 264 bits and produces a 160-bit message summary and is used for message integrity checking. It is based on the design principles of the MD4 and MD5 hash algorithms (Memory Digest 4 and 5).
Whats is Sha2?
Pseudo-collision attacks against up to 46 rounds of SHA-256. SHA-2 is a set of cryptographic hash functions designed by the NSA. SHA stands for secure hash algorithm.
Font img: https://upload.wikimedia.orgDocumentation - HashBlade
Hashblade is a multiplatform software (Gnu / Linux, MacOs, Windows) that performs text encryption for: MD5, SHA1, SHA256 and SHA512. However, the software also has the brute force functionality in the hashes previously mentioned.
"In computer science, brute force search or exhaustive search, also known as generate and test, is a trivial yet very general problem solving technique that consists of enumerating all possible candidates for the solution and checking each candidate to see if he or she satisfies the problem statement.":information_source: Software startup screen
Ubuntu Gnu/Linux Operating System
Windows Operating System
:information_source: Compilation
The compilation process is basically the same in all operating systems, because it is a software written in c ++ language. While using :penguin: Gnu/Linux operating systems, just use the make command to compile and generate the binary ELF
```shellscript
make
```
or
```shellscript
g++ hashblade.cpp lib/md5.cpp lib/sha1.cpp lib/sha256.cpp lib/sha512.cpp lib/libhashblade.cpp -o hashblade
```
:heavy_exclamation_mark: In Windows, the process is the same, and only the extension of the final file that will be changed to hashblade.exe
:information_source: Text Encryption
```shellscript
hashblade -md5 "12345"
```
Ubuntu Gnu/Linux Operating System<
:white_check_mark: More Options: (Remember that in windows systems, the .exe extension is necessary)
```shellscript
hashblade -sha1 "12345"
``````shellscript
hashblade -sha256 "12345"
``````shellscript
hashblade -sha512 "12345"
```And if you want to get all the hashes just type:
```shellscript
hashblade.exe "12345"
```
Windows 7 Operating System
:information_source: Encrypting a word list
```shellscript
hashblade.exe -list -sha1 mylist.txt
```
Ubuntu Gnu/Linux Operating System
:white_check_mark: Subsequently after encrypting every word list, the software generates a new list with the name listHash.txt with encrypted hashes:
Ubuntu Gnu/Linux Operating System
:information_source: Brute Force Method
The use of brute-force methods requires 3 parameters: In which type of hash the attack will apply, the list of possible passwords, and the hash itself:
```shellscript
hashblade -md5-brute wordlists/wordlistNumber.txt 827ccb0eea8a706c4c34a16891f84e7b
```
Ubuntu Gnu/Linux Operating System
:information_source: License
The hash blade is open source software licensed under the MIT LICENSE