Skip to content

smog-root/crackz

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

Crackz

Project Logo

A tool to recover you'r encrypted ZIP files using brute-force and dictionary attack's.

Caution ⚠️

  • When using a wordlist, it should not exceed 600 passwords due to Python limitations. This will be fixed in future updates.

Features

  • Brute-Force Attack: Tries all possible password combinations.
  • Configurable Password Length: Supports setting the maximum length of passwords to test.

Upcoming Features

  • Configurable Password Length: Supports setting the maximum length of passwords to test.
  • Progress Reporting: Provides feedback on the current progress of the attack.

Prerequisites

  • Python 3.x: Ensure you have Python 3.x installed. Download here.

Installation

  1. Clone repsitory:
    https://github.com/smog-root/crackz
  2. Navigate to the project directory:
    cd path\crackz

Usage

Help:

crackz.py [-h]

python3 crackz.py -h

Crack password! :trollface:

python3 crackz.py -f path/file.zip -w path/wordlist.txt

Execution

-h , --help show this help message and exit
-f , --file Enter zip file path.
-w , --wordlist Enter password word list path.
-o , --output Enter output directory for extracted files.
-ex , --extract Extract files if password is found.

License

This project is licensed under the MIT License. See the LICENSE file for details.