DescriptionPython based salt bruteforcer for known hashes. Useful when you want to find out how a certain application hashes its passwords when you have both the password and the hash. This project is still in its inception but we plan on supporting more hashes and complex functions in the near future.
For example, you were able to obtain a list of application password hashes stored in a database, including your own. To be able to brute force for other users' passwords you would first need to know how the application hashes these passwords. Salty-py attempts to guess the salt used to hash the passwords by prepending/appending user supplied salt and comparing the resultant hash to the known hash.
Example usagepython salty-py -a MD5 -p password -r 9e107d9d372bb6826bd81d3542a419d6 -w wordlist.txt
Ohloh computes statistics on FOSS projects by examining source code and commit history in source code management systems. This project has code locations but that location contains no recognizable source code for Ohloh to analyze.
Copyright © 2013 Black Duck Software, Inc. and its contributors, Some Rights Reserved. Unless otherwise marked, this work is licensed under a Creative Commons Attribution 3.0 Unported License . Ohloh ® and the Ohloh logo are trademarks of Black Duck Software, Inc. in the United States and/or other jurisdictions. All other trademarks are the property of their respective holders.