Instacracker-cli May 2026
def generate_wordlist(self, base_words: List[str], output_file: str, add_numbers: bool = True, add_special: bool = True): """Generate custom wordlist with mutations""" words = set(base_words) if add_numbers: for word in base_words: for num in range(1, 100): words.add(f"wordnum") words.add(f"wordnum:02d") if add_special: specials = ["!", "@", "#", "$", "123", "2023"] for word in base_words: for special in specials: words.add(f"wordspecial") words.add(f"specialword") with open(output_file, 'w') as f: for word in sorted(words): f.write(f"word\n") print(f"[+] Generated len(words) words to output_file") return len(words)
# Interactive mode subparsers.add_parser('interactive', help='Interactive mode') instacracker-cli
# Analyze command analyze_parser = subparsers.add_parser('analyze', help='Analyze password strength') analyze_parser.add_argument('--password', required=True, help='Password to analyze') add_numbers: bool = True
def dictionary_attack(self, target_hash: str, hash_type: str = "md5", wordlist: List[str] = None) -> Tuple[Optional[str], int]: """Perform dictionary attack against hash""" wordlist = wordlist or self.common_passwords self.attempts = 0 self.start_time = time.time() print(f"[*] Starting dictionary attack with len(wordlist) words...") for word in wordlist: self.attempts += 1 if self._check_hash(word, target_hash, hash_type): elapsed = time.time() - self.start_time return word, self.attempts, elapsed elapsed = time.time() - self.start_time return None, self.attempts, elapsed help='Password to analyze') def dictionary_attack(self
class InstaCrackerCLI: def (self, verbose=False): self.verbose = verbose self.common_passwords = self._load_common_passwords() self.attempts = 0 self.start_time = None
def analyze_password(self, password: str) -> Dict: """Analyze password strength and provide feedback""" score = 0 feedback = [] # Length check if len(password) >= 12: score += 2 elif len(password) >= 8: score += 1 else: feedback.append("Password is too short (minimum 8 characters)") # Complexity checks if re.search(r'[A-Z]', password): score += 1 else: feedback.append("Add uppercase letters") if re.search(r'[a-z]', password): score += 1 else: feedback.append("Add lowercase letters") if re.search(r'\d', password): score += 1 else: feedback.append("Add numbers") if re.search(r'[!@#$%^&*(),.?":{}|<>]', password): score += 1 else: feedback.append("Add special characters") # Check against common passwords if password.lower() in self.common_passwords: score -= 2 feedback.append("Password is too common") # Entropy calculation (simplified) charset_size = 0 if re.search(r'[a-z]', password): charset_size += 26 if re.search(r'[A-Z]', password): charset_size += 26 if re.search(r'\d', password): charset_size += 10 if re.search(r'[!@#$%^&*(),.?":{}|<>]', password): charset_size += 32 entropy = len(password) * (charset_size.bit_length() - 1) if charset_size > 0 else 0 # Strength rating if score >= 5: strength = "Very Strong" elif score >= 4: strength = "Strong" elif score >= 3: strength = "Moderate" elif score >= 2: strength = "Weak" else: strength = "Very Weak" return { "score": score, "strength": strength, "entropy_bits": entropy, "feedback": feedback, "length": len(password), "has_upper": bool(re.search(r'[A-Z]', password)), "has_lower": bool(re.search(r'[a-z]', password)), "has_digits": bool(re.search(r'\d', password)), "has_special": bool(re.search(r'[!@#$%^&*(),.?":{}|<>]', password)) } def main(): parser = argparse.ArgumentParser( description='InstaCracker CLI - Password Security Testing Tool', formatter_class=argparse.RawDescriptionHelpFormatter, epilog=""" Examples: %(prog)s hash --target 5f4dcc3b5aa765d61d8327deb882cf99 --type md5 %(prog)s analyze --password "MySecurePass123!" %(prog)s brute --hash 5f4dcc3b5aa765d61d8327deb882cf99 --max-length 5 %(prog)s generate --words admin,password,test --output wordlist.txt """ )