Token Reverser is a word list generator to crack security tokens.
Example Use Case
./token-reverser.py –date “Tue, 10 Mar 2020 17:12:59 GMT” Foo Bar foo.bar@example.com 1985-05-23 202-555-0185 “3634 Forest Drive” 74824 > words
hashcat64.exe -m 0 582431d4c7b57cb4a3570041ffeb7e10 words
hashcat (v5.1.0) starting…
[…]
582431d4c7b57cb4a3570041ffeb7e10:74824!Foo!Bar!foo.bar@example.com!1583860379
Session……….: hashcat
Status………..: Cracked
Hash.Type……..: MD5
Hash.Target……: 582431d4c7b57cb4a3570041ffeb7e10
[…]
md5(user ID!first name!last name!email!current timestamp)
Also Read – Pickl3 : Windows Active User Credential Phishing Tool
Usage
usage: token-reverser.py [-h] [-d DATE] [-o TIMESTAMP_OFFSET] [-s SEPARATORS]
data [data …]
Word list generator to crack security tokens v1.1
Positional arguments:
data data chunks
Optional arguments:
-h, –help show this help message and exit
-d DATE, –date DATE timestamp from this date will be used as an additional data chunk, example: Tue, 10 Mar 2020 14:06:36 GMT
-o TIMESTAMP_OFFSET, –timestamp-offset TIMESTAMP_OFFSET
how many previous (to timestamp from date) timestamps
should be used as an additional data chunk, default: 1
-s SEPARATORS, –separators SEPARATORS data chunks separators to check, default: ~`!@#$%^&*()_+-={}|[]\:”;'<>?,./ \t
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…