miércoles, 26 de mayo de 2010

Crackeador MD5 Consultando en BDs [Beta Version]

Crackeador MD5 Consultando en BDs [Beta Version]: "Me he llegado a morir buscando este code, hasta que por fin lo tengo! Esta en Python. Debo darle las gracias a Bacardi, ya que gracias a el que me lo paso lo tengo.

Es un codigo increible, super rapido, aunque con algunos errores que ahora me pondre a trabajar en ellos.









from urllib import *

import urllib2,sys,string,os,re,cookielib



#get result from http://gdataonline.com/

def gdataonline(hash):

html1=urlopen('http://gdataonline.com/qkhash.php?mode=xml&hash='+hash).read()

if 'No input file specified.' in html1:

result='Hash not found'

else:

result=re.findall('\S+',html1)[0][8:-9]

return result



#get result from http://md5.rednoize.com/

def rednoize(hash):

html2=urlopen('http://md5.rednoize.com/?s=md5&q='+hash).read()

if '
' in html2:

result='Hash not found'

else:

reslut=re.findall('
\S+
',html2)[0][18:-6]

return result



#get result from http://alimamed.pp.ru/

def alimamed(hash):

html3=urlopen('http://alimamed.pp.ru/md5/?md5e=&md5d='+hash).read()

if '
' in html3:

result=re.findall('\S+
',html3)[0][3:-24]

else:

result='Hash not found'

return result



#get result from http://hashkiller.com/

def hashkiller(hash):

html4=urlopen('http://hashkiller.com/api/api.php?md5='+hash).read()

if 'true' in html4:

result=re.findall('\S+',html4)[0][7:-8]

else:

result='Hash not found'

return result



#get result from http://generuj.pl/

#need cookies,i do not know cookie is common use or not



#get result from www.beler.net

def beler(hash):

html6=urlopen('http://www.beler.net/md5reverse/'+hash).read()

if 'NotFound' in html6:

result='Hash not found'

elif 'Found !' in html6:

result='found but need purchase in http://www.beler.net/md5reverse/'

else:

result=re.findall('\S+',html6)[0][52:-7]

return result



#get result from www.md5crack.com

def md5crack(hash):

url1='http://www.md5crack.com/crackmd5.php'

param1=urlencode({'term':hash,'crackbtn':'Crack+that+hash+baby%21'})

html7=urlopen(url1,param1).read()

if 'Sorry guess we could' in html7:

result='Hash not found'

else:

result=re.findall('md5(\'\S+\')',html7)[0][5:-2]

return result



#get result from tools.benramsey.com

def benramsey(hash):

html8=urlopen('http://tools.benramsey.com/md5/md5.php?hash='+hash).read()

if 'No value in MD5' in html8:

result='Hash not found'

else:

result=re.findall('\<\!\[CDATA\[\S+\]\]\>',html8)[1][9:-3]

return result



#get result from md5decryption.com

def md5decryption(hash):

url2='http://md5decryption.com/index.php'

param2=urlencode([('hash',hash),('submit','Decrypt+It%21')])

opener=urllib2.build_opener(urllib2.HTTPCookieProcessor(cookielib.CookieJar()))

opener.addhearders=[('User-agent', 'Mozilla/5.0')]

opener.addhearders=[('Referer',url2)]

html9=opener.open(url2,param2).read()

if 'Sorry, this MD5 hash' in html9:

result='Hash not found'

else:

result=re.findall('Decrypted Text: \S+',html9)[0][20:-7]

return result



#get result from md5decrypter.com

def md5decrypter(hash):

url3='http://md5decrypter.com/index.php'

param3=urlencode([('hash',hash),('submit','Decrypt%21')])

opener=urllib2.build_opener(urllib2.HTTPCookieProcessor(cookielib.CookieJar()))

opener.addhearders=[('User-agent', 'Mozilla/5.0')]

opener.addhearders=[('Referer',url3)]

html10=opener.open(url3,param3).read()

if 'A decryption for this hash' in html10:

result='Hash not found'

else:

result=re.findall('Normal Text: \S+\n
',html10)[0][17:-6]

return result



#get result from milw0rm.com

def milw0rm(hash):

url4='http://milw0rm.com/cracker/search.php'

param4=urlencode([('hash',hash),('Submit','Submit')])

opener=urllib2.build_opener(urllib2.HTTPCookieProcessor(cookielib.CookieJar()))

opener.addhearders=[('User-agent', 'Mozilla/5.0')]

opener.addhearders=[('Referer',url4)]

html11=opener.open(url4,param4).read()

if hash not in html11:

result='Hash not found'

else:

result=re.findall('nowrap="nowrap" width=90>\S+',html11)[1][25:-5]

return result



#get result from hashcrack.com

def hashcrack(hash):

url5='http://hashcrack.com/index.php'

param5=urlencode([('hash',hash),('string',''),('Submit','Submit')])

opener=urllib2.build_opener(urllib2.HTTPCookieProcessor(cookielib.CookieJar()))

opener.addhearders=[('User-agent', 'Mozilla/5.0')]

opener.addhearders=[('Referer',url5)]

html12=opener.open(url5,param5).read()

if 'Hash not found' in html12:

result='Hash not found'

else:

result=re.findall('\S+',html12)[0][23:-7]

return result



#get result from md5.allfact.info

def allfact(hash):

url6='http://md5.allfact.info/index.php'

param6=urlencode([('decrypt',hash),('act','decrypt')])

opener=urllib2.build_opener(urllib2.HTTPCookieProcessor(cookielib.CookieJar()))

opener.addhearders=[('User-agent', 'Mozilla/5.0')]

opener.addhearders=[('Referer',url6)]

html13=opener.open(url6,param6).read()

if 'Sorry, we could' in html13:

result='Hash not found'

else:

result=re.findall('cols=12 rows="1">\S+',html13)[0][17:-11]

return result



#get result from hashchecker.com

def hashchecker(hash):

url7='http://hashchecker.com/index.php'

param7=urlencode([('_sls','search_hash'),('search_field',hash),('Submit','search')])

opener=urllib2.build_opener(urllib2.HTTPCookieProcessor(cookielib.CookieJar()))

opener.addhearders=[('User-agent', 'Mozilla/5.0')]

opener.addhearders=[('Referer',url7)]

html14=opener.open(url7,param7).read()

if 'hash is NOT found' in html14:

result='Hash not found'

else:

result=re.findall('\S+ used charlist',html14)[0][3:-18]

return result



if len(sys.argv)==2:

hash=sys.argv[1]

if len(hash)==32:

print '\nplz waiting for a moment......'

result=hashkiller(hash)

if result!='Hash not found':

print 'crack on hashkiller.com and result is %s' % result

print '\nenjoy it'

sys.exit()

else:

print 'could not crack on hashkiller.com\n'

print 'test the other website,plz waiting.....'

result=gdataonline(hash)

if result !='Hash not found':

print 'cracke on gdataonline.com and result is %s' % result

print '\nenjoy it'

sys.exit()

else:

print 'could not cracke on gdataonline.com\n'

print 'test the other website,plz waiting....'

result=milw0rm(hash)

if result!='Hash not found':

print 'cracke on milw0rm.com and result is %s' % result

print '\nenjoy it'

sys.exit()

else:

print 'could not crack on milw0rm.com\n'

print 'test the other website,plz waiting....'

result=rednoize(hash)

if result!='Hash not found':

print 'cracke on md5.rednoize.com and result is %s' % result

print '\nenjoy it'

sys.exit()

else:

print 'could not crack on md5.rednoize.com\n'

print 'test the other website,plz waiting....'

result=md5crack(hash)

if result!='Hash not found':

print 'cracke on www.md5crack.com and result is %s' % result

print '\nenjoy it'

sys.exit()

else:

print 'could not crack on www.md5crack.com\n'

print 'test the other website,plz waiting....'

result=md5decryption(hash)

if result!='Hash not found':

print 'cracke on md5decryption.com and result is %s' % result

print '\nenjoy it'

sys.exit()

else:

print 'could not crack on md5decryption.com\n'

print 'test the other website,plz waiting....'

result=md5decrypter(hash)

if result!='Hash not found':

print 'cracke on md5decrypter.com and result is %s' % result

print '\nenjoy it'

sys.exit()

else:

print 'could not crack on md5decrypter.com\n'

print 'test the other website,plz waiting....'

result=hashcrack(hash)

if result!='Hash not found':

print 'cracke on hashcrack.com and result is %s' % result

print '\nenjoy it'

sys.exit()

else:

print 'could not crack on hashcrack.com\n'

print 'test the other website,plz waiting....'

result=allfact(hash)

if result!='Hash not found':

print 'cracke on md5.allfact.info and result is %s' % result

print '\nenjoy it'

sys.exit()

else:

print 'could not crack on md5.allfact.info\n'

print 'test the other website,plz waiting....'

result=alimamed(hash)

if result!='Hash not found':

print 'cracke on alimamed.pp.ru and result is %s' % result

print '\nenjoy it'

sys.exit()

else:

print 'could not crack on alimamed.pp.ru\n'

print 'test the other website,plz waiting....'

result=benramsey(hash)

if result!='Hash not found':

print 'cracke on tools.benramsey.com and result is %s' % result

print '\nenjoy it'

sys.exit()

else:

print 'could not crack on tools.benramsey.com\n'

print 'test the other website,plz waiting....'

result=beler(hash)

if result!='Hash not found' and result!='found but need purchase in http://www.beler.net/md5reverse/':

print 'cracke on www.beler.net and result is %s' % result

print '\nenjoy it'

sys.exit()

elif result=='found but need purchase in http://www.beler.net/md5reverse/':

print 'crack on www.beler.net,but need purchase'

sys.exit()

else:

print 'could not crack on www.beler.net\n'

print 'test the last one,plz waiting....'

result=hashchecker(hash)

if result!='Hash not found':

print 'cracke on hashchecker.com and result is %s' % result

print '\nenjoy it'

sys.exit()

else:

print 'could not crack on hashchecker.com\n'

print 'I am sorry,cracking is end'

print 'if you want to crack %s,maybe you need a big rainbow tables' % hash

sys.exit()



elif len(hash)==16:

print '\nwhat r u doing man? this script only support md5 32 hash\n'

print 'eg: md5crack.py 21232f297a57a5a743894a0e4a801fc3'

sys.exit()

else:

print '\nthis is md5 hash? check it plz\n'

sys.exit()

else:

print '\ncode by b4che10r [blog] blog.taskkill.net [/blog]'

print 'http://www.ydteam.com/ enjoy it!'

print '\nWarning :this script only support md5 32 hash'

print '\nusage: md5crack.py hash'

print 'eg: md5crack.py f6fdffe48c908deb0f4c3bd36c032e72\n'

sys.exit()





"

No hay comentarios:

Publicar un comentario