Jemb0t_IR3eng

[py] Wordpress Hash Cracker

Mar 10th, 2017
230
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.48 KB | None | 0 0
  1. ###########################
  2.  
  3. # [py] Wordpress Hash Cracker
  4.  
  5. ###########################
  6.  
  7. #!/usr/bin/python
  8. #--------------------------------------------------------
  9. #~Wordpress Hash Cracker
  10. #~By Yassinox.Tn
  11. #~Hacking Is illegal !
  12. #~We love Pentesting
  13. #--------------------------------------------------------
  14. from passlib.hash import phpass
  15. import time
  16. import sys
  17. import threading
  18. #--------------------------------------------------------
  19. class bcolors:
  20. HEADER = '\033[95m'
  21. OKBLUE = '\033[94m'
  22. OKGREEN = '\033[92m'
  23. WARNING = '\033[93m'
  24. FAIL = '\033[91m'
  25. ENDC = '\033[0m'
  26. #--------------------------------------------------------
  27. def logo():
  28. print bcolors.WARNING+ ''' _
  29. /`_>
  30. / /
  31. |/
  32. ____| __
  33. | \.-`` )
  34. |---``\ _.'
  35. .-`'---``_.'
  36. (__...--`` White Hat Security Testers
  37. YASSINOX.TN
  38. '''
  39. logo()
  40. #--------------------------------------------------------
  41. hash = raw_input("Hash > ") #~exemple : $P$FDj9XhuS43ooqUPB4EVddWAT5lCWyA1
  42. passl = "list.txt" #~change it by wordlist name
  43. threads = 1
  44. try:
  45. plist = open(passl).readlines()
  46. except:
  47. print bcolors.FAIL + "| We cant find 1 required list !"
  48. #--------------------------------------------------------
  49. def crack(password):
  50. hashed = phpass.verify(password, hash)
  51. hashedpass = str(hashed) + ":" + str(password)
  52. if hashedpass == "True:" + password :
  53. print bcolors.OKGREEN + "+---------------------------------------+"
  54. print bcolors.OKGREEN + "| Operation Completed !"
  55. print bcolors.OKGREEN + "| HASH > " + " " + hash
  56. print bcolors.OKGREEN + "| password >" + " " + password
  57. print bcolors.OKGREEN + "+---------------------------------------+"
  58. sys.exit(1)
  59. #--------------------------------------------------------
  60. print bcolors.OKBLUE + "+---------------------------------------+"
  61. print bcolors.OKBLUE + "| Cracking Please Wait ..."
  62. print bcolors.OKBLUE + "| Loaded %s passwords !" % len(plist)
  63. print bcolors.OKBLUE + "+---------------------------------------+"
  64. for password in plist :
  65. password = password.rstrip()
  66. for i in xrange(threads):
  67. t = threading.Thread(target=crack(password))
  68. t.start()
  69. #--------------------------------------------------------
  70.  
  71. ###########################
  72.  
  73. # Iranian Exploit DataBase = http://IeDb.Ir [2016-12-17]
  74.  
  75. ###########################
Add Comment
Please, Sign In to add comment