Token Reverser is a word list generator to crack security tokens.
Example Use Case
./token-reverser.py –date “Tue, 10 Mar 2020 17:12:59 GMT” Foo Bar foo.bar@example.com 1985-05-23 202-555-0185 “3634 Forest Drive” 74824 > words
hashcat64.exe -m 0 582431d4c7b57cb4a3570041ffeb7e10 words
hashcat (v5.1.0) starting…
[…]
582431d4c7b57cb4a3570041ffeb7e10:74824!Foo!Bar!foo.bar@example.com!1583860379
Session……….: hashcat
Status………..: Cracked
Hash.Type……..: MD5
Hash.Target……: 582431d4c7b57cb4a3570041ffeb7e10
[…]
md5(user ID!first name!last name!email!current timestamp)
Also Read – Pickl3 : Windows Active User Credential Phishing Tool
Usage
usage: token-reverser.py [-h] [-d DATE] [-o TIMESTAMP_OFFSET] [-s SEPARATORS]
data [data …]
Word list generator to crack security tokens v1.1
Positional arguments:
data data chunks
Optional arguments:
-h, –help show this help message and exit
-d DATE, –date DATE timestamp from this date will be used as an additional data chunk, example: Tue, 10 Mar 2020 14:06:36 GMT
-o TIMESTAMP_OFFSET, –timestamp-offset TIMESTAMP_OFFSET
how many previous (to timestamp from date) timestamps
should be used as an additional data chunk, default: 1
-s SEPARATORS, –separators SEPARATORS data chunks separators to check, default: ~`!@#$%^&*()_+-={}|[]\:”;'<>?,./ \t
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…