<<<<<<< HEAD
=======
0b6ccb67b36ebbe98015f27328ef7739e2ff6ddc
Educational cybersecurity tool demonstrating hash functions and password security
π Live Web Demo | π» CLI Version | π Web Portfolio
This project demonstrates cybersecurity fundamentals through an educational hash cracking tool. It showcases both command-line proficiency and web development skills by providing two complementary interfaces:
- π₯οΈ Enhanced CLI Tool - Professional command-line application with advanced features
- π Interactive Web Portfolio - Educational web interface deployed on Render
- Multi-Algorithm Support - SHA256, MD5, SHA1, SHA512
- Real-time Progress Tracking - Live attempts counter and speed indicator
- Professional Interface - Colorful ANSI output with emojis
- Command Line Arguments - Full CLI interface with argparse
- Threading Support - Non-blocking progress indicators
- Performance Metrics - Detailed timing and rate statistics
- Interactive Hash Generator - Real-time hash creation
- Demo Cracking Simulation - Safe educational demonstrations
- Responsive Design - Works on all devices
- Educational Content - Comprehensive security lessons
- Professional Presentation - Perfect for portfolios and job applications
π https://hash-education-portfolio.onrender.com
# Clone the repository
git clone https://github.com/TheGhostPacket/hash-cracker.git
cd hash-cracker
# Run the enhanced CLI version
python hash_cracker.py
# Or with command line arguments
python hash_cracker.py --hash 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 --wordlist wordlist.txt
# Navigate to web portfolio
cd web-portfolio
# Install dependencies
pip install -r requirements.txt
# Run Flask application
python app.py
Try these in the web demo:
- Input:
password123
β SHA256:ef92b778bafe771e89245b89ecbc08a44a4e166c06659911881f383d4473e94f
- Input:
hello
β MD5:5d41402abc4b2a76b9719d911017c592
Test with these educational hashes:
password
β5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8
(SHA256)hello
β2cf24dba4f21d4288094c85b66a5a6c59e9fe49a9ce0e473e8bba76ec1abb0fb
(SHA256)
hash-cracker/
βββ hash_cracker.py # Enhanced CLI application
βββ README.md # This documentation
βββ web-portfolio/ # Web interface
β βββ app.py # Flask backend
β βββ requirements.txt # Dependencies
β βββ templates/
β β βββ index.html # Frontend interface
β βββ README.md # Deployment instructions
βββ wordlists/ # Sample wordlists (optional)
β βββ common.txt
βββ examples/ # Sample hashes (optional)
βββ test_hashes.txt
- β Python programming with advanced features
- β Flask web framework
- β RESTful API design
- β Error handling and validation
- β Threading and concurrency
- β Responsive HTML/CSS design
- β Interactive JavaScript
- β Modern UI/UX principles
- β Progressive enhancement
- β Cloud deployment (Render)
- β Environment configuration
- β Production-ready applications
- β CI/CD with Git integration
- β Cryptographic hash functions
- β Password security analysis
- β Attack vector understanding
- β Security best practices
Algorithm | CLI Support | Web Support | Output Length | Security Level |
---|---|---|---|---|
MD5 | β | β | 32 chars | |
SHA-1 | β | β | 40 chars | |
SHA-256 | β | β | 64 chars | β Strong |
SHA-512 | β | β | 128 chars | β Very Strong |
- Processing Speed: ~15,000 hashes/second
- Memory Usage: < 50MB for large wordlists
- File I/O: Optimized streaming for GB+ files
- Threading: Non-blocking UI updates
- Response Time: < 100ms for hash generation
- Concurrent Users: Handles 50+ simultaneous demos
- Mobile Responsive: Works on all screen sizes
- Accessibility: WCAG 2.1 compliant
- Password Vulnerability: How weak passwords are compromised
- Hash Function Properties: One-way functions, collision resistance
- Attack Methodologies: Dictionary attacks, brute force techniques
- Defense Strategies: Salting, key stretching, strong passwords
- Educational Focus: Designed for learning, not malicious use
- Controlled Environment: Web demo uses only safe, predefined data
- Security Awareness: Promotes better password practices
- Responsible Disclosure: Clear usage guidelines and disclaimers
- Basic dictionary attack implementation
- Simple file processing
- Core functionality proof-of-concept
- Added multiple hash algorithms
- Implemented progress tracking
- Professional UI with colors and animations
- Command-line argument parsing
- Performance optimizations
- Translated core functionality to web interface
- Added educational content and demonstrations
- Implemented safe, demo-only cracking
- Deployed to cloud platform
- Created comprehensive documentation
- GPU acceleration integration
- Advanced attack modes (hybrid, rule-based)
- Real-time collaboration features
- Educational certification integration
- Platform: Render.com
- URL: https://hash-education-portfolio.onrender.com
- Stack: Python 3.11, Flask 2.3.3, Gunicorn
- Features: Auto-deployment from GitHub, custom domain support
Both versions can be run locally for development and testing. See individual README files for specific instructions.
Contributions welcome! Areas for improvement:
- Additional hash algorithm support
- Enhanced educational content
- Mobile app version
- Performance optimizations
- Accessibility improvements
# Fork the repository
git clone https://github.com/yourusername/hash-cracker.git
cd hash-cracker
# Create feature branch
git checkout -b feature/your-enhancement
# Make changes and test
python hash_cracker.py # Test CLI
cd web-portfolio && python app.py # Test web
# Submit pull request
This project is designed exclusively for educational purposes:
- β Learning cybersecurity concepts
- β Testing personal systems with authorization
- β Educational demonstrations and training
- β Security research in controlled environments
- β Unauthorized system attacks
- β Illegal password cracking
- β Malicious activities
- β Circumventing security without permission
TheGhostPacket
- π GitHub: @TheGhostPacket
- πΌ LinkedIn: Your LinkedIn Profile
- π Portfolio: Live Demo
- π§ Contact: contact@theghostpacket.com
=======
An advanced educational tool for understanding password security and cryptographic hash functions
- Colorful Terminal Interface - Beautiful ANSI colors and emojis
- Real-time Progress Tracking - Live attempts counter and speed indicator
- Professional Banner - Clean, attractive startup display
- Smart Input Validation - Automatic hash format verification
- Multiple Hash Algorithms - SHA256, MD5, SHA1, SHA512 support
- Command Line Arguments - Full CLI interface with argparse
- Threading Support - Non-blocking progress indicators
- Error Handling - Robust file and encoding error management
- Performance Metrics - Detailed timing and rate statistics
- Sample Hash Generator - Create test hashes for practice
- File Size Detection - Wordlist size information
- Keyboard Interrupt Handling - Graceful exit with Ctrl+C
python hash_cracker.py
# Crack a SHA256 hash with rockyou.txt
python hash_cracker.py --hash 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 --wordlist rockyou.txt
# Use different algorithm
python hash_cracker.py -H ef92b778bafe771e89245b89ecbc08a44a4e166c06659911881f383d4473e94f -w passwords.txt -a sha256
# Generate sample hashes for testing
python hash_cracker.py --samples
# Run without progress indicator (for scripting)
python hash_cracker.py --no-progress --hash [HASH] --wordlist [FILE]
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β π HASH CRACKER v2.0 β
β Educational Security Tool β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
π Starting SHA256 crack attack...
π Wordlist: rockyou.txt (133.4 MB)
π― Target: 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8
β Attempts: 2,847 | Rate: 15,230/sec | Time: 0.2s
π SUCCESS! Password found!
π Password: hello
β±οΈ Time taken: 0.19 seconds
π’ Attempts: 2,847
π Rate: 15,037 attempts/sec
- How dictionary attacks work in practice
- Why password complexity matters
- The role of salt in password security
- Hash function properties and differences
- File I/O with proper encoding handling
- Threading for non-blocking operations
- Command-line argument parsing
- Error handling and user input validation
- ANSI color codes and terminal formatting
- Algorithm efficiency comparison
- I/O bottlenecks in brute force attacks
- Memory vs. speed trade-offs
Algorithm | Output Length | Strength | Common Uses |
---|---|---|---|
MD5 | 32 chars | Legacy systems | |
SHA1 | 40 chars | Git commits | |
SHA256 | 64 chars | β Strong | Bitcoin, SSL |
SHA512 | 128 chars | β Very Strong | High security |
hash-cracker/
βββ hash_cracker.py # Main enhanced script
βββ README.md # This documentation
βββ wordlists/ # Sample wordlists
β βββ common.txt
β βββ rockyou.txt
βββ examples/ # Sample hashes
βββ test_hashes.txt
The tool includes a sample hash generator for practice:
python hash_cracker.py --samples
Sample Targets:
hello
β2cf24dba4f21d4288094c85b66a5a6c59e9fe49a9ce0e473e8bba76ec1abb0fb
(SHA256)password
β5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8
(SHA256)
- Use SSD storage for faster wordlist reading
- Smaller wordlists first - try common passwords before massive lists
- Multiple algorithms - some hashes might be easier to crack with different functions
- Sort wordlists by frequency for better hit rates
- Weak passwords can be cracked in seconds
- Dictionary attacks are still highly effective
- Password reuse amplifies the risk
- Proper hashing with salt prevents these attacks
- Use long, complex passwords (12+ characters)
- Enable two-factor authentication
- Use unique passwords for each account
- Consider password managers
This tool is designed for:
- β Learning cybersecurity concepts
- β Testing your own systems
- β Authorized penetration testing
- β Security research
- β Attacking systems without permission
- β Illegal password cracking
- β Unauthorized access attempts
- β Any malicious activities
Contributions are welcome! Areas for improvement:
- Additional hash algorithms
- GPU acceleration support
- Hybrid attack modes
- Rule-based transformations
- Web interface
- Study rainbow tables and their prevention
- Learn about bcrypt, scrypt, and Argon2
- Explore GPU-accelerated cracking
- Understand timing attacks
π€ Built by TheGhostPacket
Remember: With great power comes great responsibility. Use this knowledge to build more secure systems, not to break them.
0b6ccb67b36ebbe98015f27328ef7739e2ff6ddc
<<<<<<< HEAD π‘οΈ Built for Security Education β’ π§ Promoting Ethical Learning β’ π Advancing Cybersecurity
This project demonstrates technical proficiency while promoting responsible cybersecurity practices.