Hash-Buster v3.0 is a tool to Crack Hashes In Seconds.
Features
Note: Hash Buster isn’t compatible with python2, run it with python3 instead. Also, Hash-Buster uses some APIs for hash lookups, check the source code if you are paranoid.
Hash-Buster can be run directly from the python script but I highly suggest you to install it with make install
After the installation, you will be able to access it with buster command.
You don’t need to specify the hash type. Hash Buster will identify and crack it under 3 seconds.
Usage: buster -s <hash>
Finding hashes from a directory
Yep, just specify a directory and Hash Buster will go through all the files and directories present in it, looking for hashes.
Usage: buster -d /root/Documents
Hash Buster can find your hashes even if they are stored in a file like this
simple@gmail.com:21232f297a57a5a743894a0e4a801fc3
{“json@gmail.com”:”d033e22ae348aeb5660fc2140aec35850c4da997″}
surrondedbytext8c6976e5b5410415bde908bd4dee15dfb167a9c873fc4bb8a81f6f2ab448a918surrondedbytext
Usage: buster -f /root/hashes.txt
Multi-threading can incredibly minimize the overall speed when you have a lot of hashes to crack by making requests in parallel.
Usage: buster -f /root/hashes.txt -t 10
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…