Zydra : Password Recovery Tool & Linux Shadow File Cracker

Zydra is a file password recovery tool and Linux shadow file cracker. It uses the dictionary search or Brute force method for cracking passwords.

Supported Files

  • RAR Files
  • Legacy ZIP Files
  • PDF Files
  • Linux Shadow Files (zydra can find all the user’s password in the linux shadow file one after the other)

Prerequisites

To run the app, minimal requirements are:

  • Python 3.3 or higher
  • debian-based linux distro, preferably Kali linux 2
  • qpdf and unrar packages
    Installing these packages on kali is as easy as running the following commands on terminal:
    $ sudo apt-get update
    $ sudo apt-get install qpdf unrar
  • some python modules in this program need to be installed manually, like: zipfile, rarfile, crypt, pyfiglet, py-term(for term module) and so on. you can use pip3 for install them example:
    $ pip3 install py-term
    notice
    : rar,zip and pdf files must have an extension, shadow files does not need an extension.

Also Read – Metabigor : Command Line Search Engines Without Any API Key

Features

  • Cracking files password using two methods: 1. dictionary method 2. brute force method
  • In the brute force method, you can specify the min length and max length of the passwords.
  • In the brute force method, you can specify the type of characters that may be used in the password.
  • There is a percent progress bar showing how much of the process has been performed.
  • Error handling.
  • One of the most important features of Zydra is the multiprocessing feature that speeds up the program. For example if you have 8 CPU cores, Zydra will use all of them for processing at the same time.

Installation

Download Zydra by cloning the Git repository: 

$ git clone https://github.com/hamedA2/Zydra.git

Usage

To get a list of all options and learn how to use this app, enter the following command:

$ python3 Zydra.py -h

Examples

  • Dictionary search to find the password for a zip file

In this example I use rockyou.txt dictionary

$ python3 Zydra.py –f file.zip –d rockyou.txt

  • Brute force search to find the password for the users in the shadow file

Minimum length of password is 4 and maximum length is 4 and we try to find passwords that are composed of numbers and symbols letters.

$ python3 Zydra.py –f shadow –b digits,symbols –m 4 –x 4

Disclaimer

This tool is only for testing and academic purposes Do not use it for illegal purposes!

R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

1 month ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

1 month ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

1 month ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

1 month ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

1 month ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

1 month ago