Here are the Wordlists & Bruteforce attacks we offer
We propose several world famous and very efficient Wordlists from public repositories and from our own private collection.
- Probable-Wordlists is a well known Github repo with Wordlists sorted by probability
- weakpass is another well known Wordlists repo
- Our own wordlists collection, a merge of real passowrds
- Contact us if you want to see other wordlists added to this list
You can also add a Ruleset to your attack, to mangle words and create new candidates. Rules modify, cut or extend candidates to create more passwords.
The attack becomes (far) more efficient.
More information about Rule-based attacks.
Tries all combinations from a given keyspace. It needs a Charset and a Length:
- Charset: can be Lowercase (a to z), Uppercase (A to Z), Digit (0 to 9), Symbols, etc.
- Length: password length
The number of candidates (keyspace) to try is: Number of chars in Charset ^ Length.
The cracking duration is: Keyspace / Hashrate.
Configure a custom Bruteforce attack with your own Charset and Length via our Bruteforce Configurator: (example below)
The Summary part shows:
- The chosen Charset (here Lowercase + Digits)
- The chosen Length (here from 4 to 10 characters)
- Number of candidates we will test for you, here: 3,760,620,109,731,072
- Estimated duration of the job, which depends on the previous Charset and Length choices and the algorithm (MD5 in this example).
- Payment is then required before we launch this bruteforce job for you. The price is $12/hour. For comparison, the same setup in AWS costs more than $40/hr. We strive to be always cheaper than Cloud Providers.
Get more information here.