Skip to content

HARUKO is a robust tool designed to generate customizable password wordlists for brute-force attacks

License

Notifications You must be signed in to change notification settings

kUrOSH1R0oo/Haruko

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

34 Commits
 
 
 
 
 
 

Repository files navigation

HARUKO - An Advanced Password Wordlist Generator for Brute-Force an Dictionary Attacks

HARUKO is a robust tool designed to generate customizable password wordlists for brute-force attacks.

[+] Features

  • Customizable Wordlists: Create wordlists with specific character sets, lengths, and patterns.
  • Year Formatting: Add formatted year information to your wordlists with customizable positions and formats.
  • Delimiter Support: Use custom delimiters between characters and years.
  • Compression Support: Optionally compress the output file for efficient storage.
  • Multithreaded Processing: Utilize multiple CPU threads for faster generation.
  • Configurable Encoding: Choose the encoding for the output file.
  • Pattern Filtering: Use regular expressions to filter generated words.

[+] Installation (Manual)

  1. Clone the Repository:

    git clone https://github.com/kUrOSH1R0oo/Haruko
  2. Install gzip:

    apt install gzip
  3. Navigate to the directory:

    cd Haruko
  4. Run the script to show up the Main Menu:

    python3 haruko.py

[+] Available Parameters

Parameters Description Example
-c, --characters Set of characters to include in the wordlist. abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789
-min, --min_length Minimum length of the words (default: 4). 4
-max, --max_length Maximum length of the words (default: 6). 6
-o, --output_file Output file name (default: custom_wordlist.txt). Includes timestamp by default. custom_wordlist.txt
-p, --prefix Prefix for each word (default: ""). "pre_"
-s, --suffix Suffix for each word (default: ""). "_suf"
-e, --exclusions Characters to exclude from the wordlist. l1o0
-inc, --include_lengths Specific lengths to include in the wordlist. 6 8 10
-exc, --exclude_lengths Specific lengths to exclude from the wordlist. 7 9
-t, --threads Number of threads to use (default: number of CPU cores). 8
-z, --compress Compress the output file using gzip. (no argument, but file will be compressed)
-enc, --encoding Encoding for the output file (default: utf-8). utf-8
-cfg, --config_file Path to a JSON configuration file for loading options. config.json
-r, --regex Regular expression pattern to filter generated words. ^[a-zA-Z0-9]{8}$
-y, --year_range Year range to include, formatted as start_year-end_year. 2020-2024
-yp, --year_position Position to place the year: 'prefix', 'suffix', or specific position index (e.g., '2'). suffix
-yf, --year_format Year format: 'YY', 'YYYY', 'MMYY'. YYYY
-yd, --year_delimiters Delimiters to use between words and years, separated by spaces (e.g., '-', '_', ''). - _
--no-timestamp Exclude timestamp from the output file name. (no timestamp in file name)

[+] Basic Usage

python3 haruko.py -c abc123 -min 1 -max 6 -o wordlist.txt

Note: Some combinations cannot be fitted or used when you used a parameter that is not compatible with another parameter, it can result to 0 generated word or an error.

[+] License

  • This project is licensed under MIT License

About

HARUKO is a robust tool designed to generate customizable password wordlists for brute-force attacks

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages