parkdream1

x-crack.py

Aug 9th, 2012
262
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 7.58 KB | None | 0 0
  1. import sys
  2. import time
  3. import urllib2
  4. import urllib
  5. import re
  6. import hashlib
  7.  
  8. def banner():
  9.   print '''
  10. r00t-tEaM
  11. @parkdream1
  12. http://parkdream1.blogspot.com
  13. http://xgrvn.net/XgR
  14. Enter string to start cracking
  15. '''
  16. banner()
  17. try:
  18.     while True:
  19.         passwd = raw_input(">> ")
  20.         if len(passwd) != 32:
  21.             print '\n[*] Error: "%s" doesn\'t seem to be a valid MD5 hash "32 bit hexadecimal"' % passwd
  22.             exit(0)
  23.  
  24.         def myaddr():
  25.             site = 'http://md5.my-addr.com/'
  26.             rest = 'md5_decrypt-md5_cracker_online/md5_decoder_tool.php'
  27.             para = urllib.urlencode({'md5':passwd})
  28.             req  = urllib2.Request(site+rest)
  29.             try:
  30.                 fd = urllib2.urlopen(req, para)
  31.                 data = fd.read()
  32.                 match= re.search('(Hashed string</span>: )(\w+.\w+)', data)
  33.                 if match: print '[-] site: %s\t\t\tPassword: %s' % (site, match.group(2))
  34.                 else: print '[-] site: %s\t\t\tPassword: Not found' % site
  35.             except urllib2.URLError:  print '[+] site: %s \t\t\t[+] Error: seems to be down' % site
  36.        
  37.         myaddr()
  38.    
  39.         def victorov():
  40.             try:
  41.                 site = 'http://www.victorov.su/'
  42.                 para = 'md5/?md5e=&md5d=%s' % passwd
  43.                 req  = urllib2.Request(site+para)
  44.                 req.add_header
  45.                 opener = urllib2.urlopen(req)
  46.                 data = opener.read()
  47.                 match = re.search('(<b>)(.+[^>])(</b>)', data)
  48.                 if match: print '[-] site: %s\t\t\tPassword: %s' % (site, match.group(2))
  49.                 else: print '[-] site: %s\t\t\tPassword: Not found' % site
  50.             except urllib2.URLError:  print '[+] site: %s \t\t\t[+] Error: seems to be down' % site
  51.        
  52.         victorov()
  53.      
  54.         def md5crack():
  55.             site = 'http://www.md5crack.com/'
  56.             rest = 'crackmd5.php'
  57.             para = urllib.urlencode({'term':passwd})
  58.             req = urllib2.Request(site+rest)
  59.             try:
  60.                 fd = urllib2.urlopen(req, para)
  61.                 data = fd.read()
  62.                 match = re.search('(Found: md5)(..)(\w+.\w+)', data)
  63.                 if match: print '[-] site: %s\t\t\tPassword: %s' % (site, match.group(3))
  64.                 else: print '[-] site: %s\t\t\tPassword: Not found' % site
  65.             except urllib2.URLError: print '[+] site: %s \t\t\t[+] Error seems to be down' % site
  66.    
  67.         md5crack()
  68.      
  69.         def passcracking():
  70.             site = 'http://passcracking.com/'
  71.             rest = 'index.php'
  72.             para = urllib.urlencode({'datafromuser':passwd})
  73.             req = urllib2.Request(site+rest)
  74.             try:
  75.                 fd = urllib2.urlopen(req, para)
  76.                 data = fd.read()
  77.                 match = re.search(r"(<td bgcolor=#FF0000>)(.+[^<])(</td><td>)", data)
  78.                 if match: print '[-] site: %s\t\t\tPassword: %s' % (site, match.group(2))
  79.                 else: print '[-] site: %s\t\t\tPassword: Not found' % site
  80.             except urllib2.URLError: print '[+] site: %s \t\t\t[+] Error: seems to be down' % site
  81.        
  82.         passcracking()
  83.  
  84.         def rednoize():
  85.             site = 'http://md5.rednoize.com/'
  86.             para = 'p&s=md5&q=%s&_=' % passwd
  87.             try:
  88.                 req = urllib2.urlopen(site+'?'+para)
  89.                 data = req.read()
  90.                 if not len(data): print '[-] site: %s\t\t\tPassword: Not found' %site
  91.                 else: print '[-] site: %s\t\t\tPassword: %s' % (site, data)
  92.             except urllib2.URLError: print '[+] site: %s \t\t\t[+] Error: seems to be down' % site
  93.  
  94.         rednoize()
  95.  
  96.         def md5pass():
  97.             site = 'http://www.md5pass.info/'
  98.             para = urllib.urlencode({'hash':passwd, 'get_pass':'Get+Pass'})
  99.             req = urllib2.Request(site)
  100.             try:
  101.                 fd = urllib2.urlopen(req, para)
  102.                 data = fd.read()   
  103.                 match = re.search('(Password - <b>)(\w+)', data)
  104.                 if match: print '[-] site: %s\t\t\tPassword: %s' % (site, match.group(2))
  105.                 else: print '[-] site: %s\t\t\tPassword: Not found' % site
  106.             except urllib2.URLError: print '[+] site: %s \t\t\t[+] Error: seems to be down' % site
  107.  
  108.         md5pass()
  109.  
  110.         def md5decryption():
  111.             site = 'http://md5decryption.com/'
  112.             para = urllib.urlencode({'hash':passwd,'submit':'Decrypt+It!'})
  113.             req = urllib2.Request(site)
  114.             try:
  115.                 fd = urllib2.urlopen(req, para)
  116.                 data = fd.read()
  117.                 match = re.search(r'(Decrypted Text: </b>)(.+[^>])(</font><br/><center>)', data)
  118.                 if match: print '[-] site: %s\t\t\tPassword: %s' % (site, match.group(2))
  119.                 else: print '[-] site: %s\t\t\tPassword: Not found' % site
  120.             except urllib2.URLError: print '[+] site: %s \t\t\t[+] Error: seems to be down' % site
  121.        
  122.         md5decryption()
  123.  
  124.         def hashkiller():
  125.             site = 'http://opencrack.hashkiller.com/'
  126.             para = urllib.urlencode({'oc_check_md5':passwd,'oc_submit':'Search+MD5'})
  127.             req = urllib2.Request(site)
  128.             try:
  129.                 fd = urllib2.urlopen(req, para)
  130.                 data = fd.read()
  131.                 match = re.search('(<div class="result">)(\w+)(:)(\w+.\w+)', data)
  132.                 if match:
  133.                     print '[-] site: %s\t\t\tPassword: %s' % (site.replace('http://', ''), match.group(4).replace('<br',''))
  134.                 else: print '[-] site: %s\t\t\tPassword: Not found' % site.replace('http://', '')
  135.             except urllib2.URLError: print '[+] site: %s \t\t\t[+] Error: seems to be down' % site
  136.  
  137.         hashkiller()
  138.  
  139.         def bigtrapeze():
  140.             site = 'http://www.bigtrapeze.com/'
  141.             rest = 'md5/index.php?query=%s' % passwd
  142.             req = urllib2.Request(site+rest)
  143.             req.add_header('User-Agent', 'Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.2) Gecko/20100316 AskTbSPC2/3.9.1.14019 Firefox/3.6.2')
  144.             try:
  145.                 opener = urllib2.build_opener()
  146.                 data = opener.open(req).read()
  147.                 match = re.search('(=> <strong>)(\w+.\w+)', data)
  148.                 if match: print '[-] site: %s\t\t\tPassword: %s' % (site, match.group(2))
  149.                 else: print '[-] site: %s\t\t\tPassword: Not found' % site
  150.             except urllib2.URLError: print '[+] site: %s \t\t\t[+] Error: seems to be down' % site
  151.    
  152.         bigtrapeze()
  153.  
  154.         def cloudcracker():
  155.             site = 'http://www.netmd5crack.com/'
  156.             para = 'cgi-bin/Crack.py?InputHash=%s' % passwd
  157.             try:
  158.                 req = urllib.urlopen(site+para)
  159.                 data = req.read()
  160.                 match = re.search(r'<tr><td class="border">[^<]+</td><td class="border">(?P<hash>[^>]+)</td></tr></tbody></table>', data)
  161.                 if match: print '[-] site: %s\t\t\tPassword: %s' % (site, match.group(hash))
  162.                 else: print '[-] site: %s\t\t\tPassword: Not found' % site
  163.             except urllib2.URLError: print '[+] site: %s \t\t\t[+] Error: seems to be down' % site
  164.    
  165.         cloudcracker()
  166.  
  167.         def hashchecker():
  168.             site = 'http://www.hashchecker.com/'
  169.             para = urllib.urlencode({'search_field':passwd, 'Submit':'search'})
  170.             req = urllib2.Request(site)
  171.             try:
  172.                 fd = urllib2.urlopen(req, para)
  173.                 data = fd.read()
  174.                 match = re.search('(is <b>)(\w+)', data)
  175.                 if match: print '[-] site: %s\t\t\tPassword: %s' % (site, match.group(2))
  176.                 else: print '[-] site: %s\t\t\tPassword: Not found' % site
  177.             except urllib2.URLError: print '[+] site: %s \t\t\t[+] Error: seems to be down' % site
  178.  
  179.         hashchecker()  
  180.  
  181.         def hashcracking():
  182.             site = 'http://md5.hashcracking.com/'
  183.             rest = 'search.php'
  184.             para = 'md5=%s' % passwd
  185.             try:
  186.                 req = urllib2.urlopen(site+rest+'?'+para)
  187.                 data = req.read()
  188.                 match = re.search('(is)(.)(\w+.\w+)', data)
  189.                 if match: print '[-] site: %s\t\t\tPassword: %s' % (site, match.group(3))
  190.                 else: print '[-] site: %s\t\t\tPassword: Not found' % site
  191.             except urllib2.URLError: print '[+] site: %s \t\t\t[+] Error: seems to be down' % site
  192.    
  193.         hashcracking()
  194.    
  195.         def cloudcracker():
  196.             site = 'http://www.cloudcracker.net/'
  197.             para = urllib.urlencode({'inputbox':passwd, 'submit':'Crack+MD5+Hash!'})
  198.             req = urllib2.Request(site)
  199.             try:
  200.                 fd = urllib2.urlopen(req, para)
  201.                 data = fd.read()
  202.                 match = re.search('(this.select)(....)(\w+=")(\w+.\w+)', data)
  203.                 if match: print '[-] site: %s\t\t\tPassword: %s\n' % (site, match.group(4))
  204.                 else: print '[-] site: %s\t\t\tPassword: Not found\n' % site
  205.             except urllib2.URLError: print '[+] site: %s \t\t\t[+] Error: seems to be down' % site
  206.  
  207.         cloudcracker()
  208. except KeyboardInterrupt:
  209.     print("Bye Bye :)")
  210.     exit(0)
Add Comment
Please, Sign In to add comment