The Password Hash Cracker is a versatile and efficient tool designed to crack password hashes using Dictionary and Brute Force methods. It supports common hash algorithms such as MD5, SHA-1, and SHA-256.
Whether you're a security professional ๐ก๏ธ, an ethical hacker ๐ต๏ธโโ๏ธ, or just someone testing your own hashed passwords ๐, this tool helps you recover plaintext passwords from hashed values. You can use a wordlist (dictionary attack) or try all possible combinations up to a given length (brute force).
MD5, SHA-1, and SHA-256 hash cracking support ๐.
Dictionary Attack: Cracks hashes using a wordlist ๐.
Brute Force Attack: Tries every possible combination ๐ข.
Custom Wordlist: Input your own wordlist for cracking ๐.
Real-time updates: Progress tracking for brute force attacks ๐.
Simple and easy-to-understand CLI interface ๐ฎ.
Windows and Linux Instructions:
- Clone the Repository To get started, clone the project from GitHub:
git clone https://github.com/dionabazi/Password-Hash-Cracker.git 2. Navigate to the Project Folder Change to the directory where you cloned the repository:
cd Password-Hash-Cracker 3. Build the Project Once inside the folder, compile the project using .NET 6.0 or above:
dotnet build 4. Run the Tool Run the tool using the following command:
dotnet run Alternatively, if you've already built it, navigate to the bin/debug/net8.0/ folder and run the executable directly:
./PasswordHashCracker.exe Linux:
./PasswordHashCracker ๐ง Usage Once the tool is running, you can use Dictionary Attack or Brute Force Attack to crack password hashes.
Dictionary Attack: To crack a password hash using a wordlist, use this command:
PasswordHashCracker.exe -h [hash_to_crack] -w [path_to_wordlist] Where:
-h [hash] is the hash you want to crack.
-w [wordlist] is the path to your wordlist.
PasswordHashCracker.exe -h 098f6bcd4621d373cade4e832627b4f6 -w wordlist.txt Brute Force Attack: To perform a brute force attack with a custom length (e.g., between 4 and 6 characters):
PasswordHashCracker.exe -h [hash_to_crack] -b [min_length] [max_length] Where:
-h [hash] is the hash you want to crack.
-b [min_length] [max_length] specifies the range of characters for brute-forcing.
PasswordHashCracker.exe -h fcea920f7412b5da7be0cf42b8c93759 -b 4 6
Cracking an MD5 hash using the default wordlist:
PasswordHashCracker.exe -h 098f6bcd4621d373cade4e832627b4f6 -w wordlist.txt Cracking a SHA-1 hash with brute-force (min length 4, max length 6):
PasswordHashCracker.exe -h fcea920f7412b5da7be0cf42b8c93759 -b 4 6
This tool is intended for ethical hacking ๐ก๏ธ, password recovery ๐, and testing purposes only. Use it responsibly and only on systems you have permission to test. Unauthorized use is illegal and unethical ๐ซ. Always follow legal and ethical guidelines when using this tool.
Contributions are welcome! If you find bugs or have ideas for new features, feel free to fork the project and create a pull request. We follow the guidelines below for contributions:
Fork the repository and make your changes.
Create a descriptive pull request with details of what you've done.
Follow the code style and add clear comments to your code.
We appreciate your contributions! ๐
This project is open-source and available under the MIT License.
If you like this project, feel free to buy me a coffee!

