Hash-Buster v3.0 is a tool to Crack Hashes In Seconds.
Features
Note: Hash Buster isn’t compatible with python2, run it with python3 instead. Also, Hash-Buster uses some APIs for hash lookups, check the source code if you are paranoid.
Hash-Buster can be run directly from the python script but I highly suggest you to install it with make install
After the installation, you will be able to access it with buster command.
You don’t need to specify the hash type. Hash Buster will identify and crack it under 3 seconds.
Usage: buster -s <hash>
Finding hashes from a directory
Yep, just specify a directory and Hash Buster will go through all the files and directories present in it, looking for hashes.
Usage: buster -d /root/Documents
Hash Buster can find your hashes even if they are stored in a file like this
simple@gmail.com:21232f297a57a5a743894a0e4a801fc3
{“json@gmail.com”:”d033e22ae348aeb5660fc2140aec35850c4da997″}
surrondedbytext8c6976e5b5410415bde908bd4dee15dfb167a9c873fc4bb8a81f6f2ab448a918surrondedbytext
Usage: buster -f /root/hashes.txt
Multi-threading can incredibly minimize the overall speed when you have a lot of hashes to crack by making requests in parallel.
Usage: buster -f /root/hashes.txt -t 10
In a recent cyber incident, a group named CARDINAL, associated with the label Russian Legion,…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Linux is renowned for its versatility, open-source nature, and security. Whether you're a beginner, developer,…
Cyber insurance helps businesses and individuals mitigate financial losses from data breaches, ransomware, extortion, legal…
Ransomware is one of the most dangerous and destructive forms of cybercrime today. With cybercriminals…
Social media is a key part of our daily lives, with millions of users sharing…