Skip to content

Latest commit

 

History

History
54 lines (34 loc) · 2.03 KB

README.md

File metadata and controls

54 lines (34 loc) · 2.03 KB

aQracker

aQracker is a simple Python script for cracking password-protected archives using 7-Zip.

Current Version: v24.8.1 - Heatwave

Features

  • Supports both wordlist and brute-force methods for cracking passwords.
  • Utilizes multiprocessing for improved performance.
  • Integrates colorized terminal output for better user interaction.

Installation

  1. Ensure Python 3.x is installed on your system.
  2. Install the required dependencies:
pip install -r requirements.txt

You dont really have to install the dependencies manually. The script will do it for you.

  1. Download and install 7-Zip from here if not already installed.

Note: You must install the 7-Zip at default location,

For Windows: C:\Program Files\7-Zip\7z.exe For Linux/macos: 7z (must be in the PATH)

Or you can change the path in the script. Also the script is tested on Windows 10 only. So my linux people and macos users, in theory it should work on your system too but I haven't tested it. If it doesnt try to change the path of 7z executable in the script.

Usage

  1. Run the script aQracker.py.
  2. Enter the path to the archive file you want to crack.
  3. Choose either the wordlist or brute-force method. (For wordlist method, you need to provide a wordlist file i.e. .txt.)
  4. Follow the prompts to input necessary details such as wordlist path, character set, and password length.

Requirements

  • Python 3.x
  • Libraries (that doesn't come with python by default): keyboard, pyfiglet, colorama

I've disabled Keyboard usage in script for Linux as it requires you to run the script as root. If you want to use it, you can enable it in the script.

Author

License

This project is licensed under the GNU General Public License v3.0 - see the LICENSE file for details.

Disclaimer

This script is for educational, research, and testing purposes only. The author is not responsible for any misuse of the tool. Use at your own risk.