Crates.io | abrute |
lib.rs | abrute |
version | 0.1.10 |
source | src |
created_at | 2017-09-22 13:29:49.101492 |
updated_at | 2023-06-05 03:03:31.135767 |
description | AESCrypt Brute force attempter. |
homepage | https://github.com/danielpclark/abrute |
repository | https://github.com/danielpclark/abrute |
max_upload_size | |
id | 32636 |
size | 186,812 |
Abrute is a multi-threaded brute force file decryption tool. Many
features have been added to this including a resume feature, a
JSON endpoint, computer clustor workload splitting, character
adjacency limitting, and custom CLI reporters. Abrute will decrypt
the .aes
and .zip
extension files on any Linux compatible system.
abrute needs the nightly build of Rust for the TryFrom trait.
To use the install script you need to have the following commands available on your
system curl wget unzip sudo cc
and possibly other build essentials for C.
For Ubuntu and Docker images of Ubuntu you can install these prerequisites with:
apt-get update && apt-get install curl wget unzip sudo build-essential
NOTE: if you are not root you may need to precede apt-get
with sudo
The install.sh
script will check for Rust and aescrypt and proceed to install them
if they are missing (it will ask you if you want to install Rust).
First download the installation script locally.
curl https://raw.githubusercontent.com/danielpclark/abrute/master/install.sh > install.sh
Then verify that the contents of the installation script is safe to use (a no brainer). Then run
bash install.sh
This install script will use sudo to copy the binary directly to /usr/bin
and make the
command abrute
available to you everywhere.
First you need to have aescrypt installed.
wget https://www.aescrypt.com/download/v3/linux/aescrypt-3.13.tgz
tar -xzf aescrypt-3.13.tgz
cd aescrypt-3.13/src
make && sudo make install
cd ../.. && rm -rf aescrypt-3.13
Next you need to have Rust installed.
curl https://sh.rustup.rs -sSf | sh -s -- --channel=nightly
Then you can get and compile abrute.
git clone https://github.com/danielpclark/abrute.git
cd abrute
cargo +nightly build --release
sudo cp target/release/abrute /usr/bin/
USAGE: abrute <RANGE> <CHARACTERS> [OPTIONS] -- <TARGET>
<RANGE> Single digit or a range 4:6 for password length.
<CHARACTERS> Characters to use in password attempt. Don't use quotes
unless they may be in the password. Backslash may escape
characters such as space.
-a, --adjacent Set a limit for allowed adjacent characters. Zero will
not allow any characters of the same kind to neighbor
in the attempts.
-s, --start Starting character sequence to begin with.
-z, --zip Use `unzip` decryption instead of `aescrypt`.
-c, --chunk Workload chunk size per core before status update.
Defaults to 32.
--cluster Takes an offset and cluster size such as 1:4 for the
first system in a cluster of 4. Helps different systems
split the workload without trying the same passwords.
-r, --reporter Use `spinner`, or `benchmark` to use a different command
line reporter.
<TARGET> Target file to decrypt. The target must be preceeded
by a double dash: -- target.aes
-h, --help Prints help information.
-v, --version Prints version information.
Licensed under either of
at your option.
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.