Quantcast
Channel: KitPloit - PenTest Tools!
Viewing all articles
Browse latest Browse all 5816

Dagon - Advanced Hash Manipulation

$
0
0
Named after the prince of Hell, Dagon (day-gone) is an advanced hash cracking and manipulation system, capable of bruteforcing multiple hash types, creating bruteforce dictionaries, automatic hashing algorithm verification, random salt generation from Unicode to ASCII, and much more.

Screenshots
Bruteforcing made easy with a built in wordlist creator if you do not specify one. The wordlist will create 100,000 strings to use


Verify what algorithm was used to create that hash you're trying to crack. You can specify to view all possible algorithms by providing the -L flag (some algorithms are not implemented yet)


Random salting, unicode random salting, or you can make your own choice on the salt.


Basic usage
For full functionality of Dagon please reference the homepage here
python dagon.py -h This will run the help menu and provide a list of all possible flags
python dagon.py -c <HASH> --bruteforce This will attempt to bruteforce a given hash
python dagon.py -l <FILE-PATH> --bruteforce This will attempt to bruteforce a given file full of hashes (one per line)
python dagon.py -v <HASH> This will try to verify the algorithm used to create the hash
python dagon.py -V <FILE-PATH> This will attempt to verify each hash in a file, one per line

Installation
Dagon requires python version 2.7.x to run successfully.
  • git clone https://github.com/ekultek/dagon.git
  • cd Dagon
  • pip install -r requirements.txt
This should install all the dependencies that you will need to run Dagon

Contributions
All contributions are greatly appreciated and helpful. When you contribute you will get your name placed on the homepage underneath contributions with a link to your contribution. You will also get massive respect from me, and that's a pretty cool thing. What I'm looking for in contributions is some of the following:
  • Hashing algorithm creations, specifically; A quicker MD2 algorithm, full Tiger algorithms, Keychain algorithms for cloud and agile
  • More wordlists to download from, please make sure that the link is encoded
  • Rainbow table attack implementation
  • More regular expressions to verify different hash types



Viewing all articles
Browse latest Browse all 5816

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>