https://github.com/zedseven/pbkdf_pass_runner
Runs through a word list and tries all entries as passwords with a given salt for a PBKDF2 SHA-1 implementation, checking if they generate a matching given key.
https://github.com/zedseven/pbkdf_pass_runner
password-cracker password-cracking pbkdf2
Last synced: about 2 months ago
JSON representation
Runs through a word list and tries all entries as passwords with a given salt for a PBKDF2 SHA-1 implementation, checking if they generate a matching given key.
- Host: GitHub
- URL: https://github.com/zedseven/pbkdf_pass_runner
- Owner: zedseven
- License: mit
- Created: 2020-11-28T05:04:18.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2021-02-10T19:48:17.000Z (about 4 years ago)
- Last Synced: 2025-01-17T05:09:15.342Z (3 months ago)
- Topics: password-cracker, password-cracking, pbkdf2
- Language: Rust
- Homepage:
- Size: 16.6 KB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# pbkdf_pass_runner
Runs through a word list and tries all entries as passwords with a given salt for an [PBKDF2](https://en.wikipedia.org/wiki/PBKDF2) SHA-1 implementation, checking if they generate a matching given key.Note that this was written for a specific purpose, and is not designed to be a tried-and-tested tool. I also make no guarantees of it's speed, though it should be able to leverage multi-core systems fairly well.
## Usage
```
pbkdf_pass_runner.exe
```
The word list needs to have one word/password per line.