Craker is a brute force password recovery tool written entirely in python. It is a console app with no fancy gui.
- Either download windows executable (craker.exe file) or python script (craker.py file) from Releases. I recommend using python script as its little bit fast and interperater give traceback of errors if program crash but you'll need to have python (probably latest version) installed with required modules in your system.
- If you are trying to recover password of rar file then put UnRAR.exe in same directory of craker.exe or craker.py. You'll need to download WinRAR from https://www.win-rar.com/start.html?&L=0. Default directory of UnRAR.exe is
C:\Program Files (x86)\WinRAR\
orC:\Program Files\WinRAR\
depending on whether it is 32-bit or 64-bit. - Then run the executable by double clicking it or python script from terminal (cmd or powershell) and follow instructions.
- zip
- 7z with unencrypted file names
- rar with unencrypted file names
- pdf encrypted with RC4 40 or RC4 128
- Windows 10
- Python 3.10.1
- Notepad++ 8.1.3
- Pyinstaller 4.7
- pyzipper
- py7zr
- rarfile
- itertools
- time
- os
- PyPDF2
- It provides two methods:
- Brute force using charcter set
- Using dictionary
- You can define your own character set or use available ones
- You have to give minimum and maximum length of password
- You can give prefix or suffix or both
- CPU and memory usage is negligible
- Very slow especially for 7z, rar and pdf
- Archives with encrypted file names and pdf encrypted with AES are not supported
- Program is neither crashing nor showing error in case of encrypted file names in rar. And shows wrong password found.
- Pdf file with only permission restriction show wrong password found and only lock password is found in pdf files with different lock password and permission password, however all permission restrictions are removed even if permission password is not found.