Dagon - Advanced Hash Manipulation
(day-gone) is an advanced hash cracking and manipulation system, capable of bruteforcing multiple hash types, creating bruteforce dictionaries, automatic hashing algorithm verification, random salt generation from Unicode to ASCII, and much more.
Named after the prince of Hell, Dagon
Bruteforcing made easy with a built in wordlist creator if you do not specify one. The wordlist will create 100,000 strings to use
Verify what algorithm was used to create that hash you're trying to crack. You can specify to view all possible algorithms by providing the -L flag (some algorithms are not implemented yet)
Random salting, unicode random salting, or you can make your own choice on the salt.
Preferable you can close the repository with
git clone https://github.com/ekultek/dagon.git alternatively you can download the zip or tarball here
For full functionality of Dagon please reference the homepage here or the user manual
python dagon.py -h This will run the help menu and provide a list of all possible flags
python dagon.py -c <HASH> --bruteforce This will attempt to bruteforce a given hash
python dagon.py -l <FILE-PATH> --bruteforce This will attempt to bruteforce a given file full of hashes (one per line)
python dagon.py -v <HASH> This will try to verify the algorithm used to create the hash
python dagon.py -V <FILE-PATH> This will attempt to verify each hash in a file, one per line
Dagon requires python version
2.7.x to run successfully.
git clone https://github.com/ekultek/dagon.git
pip install -r requirements.txt
This should install all the dependencies that you will need to run Dagon
All contributions are greatly appreciated and helpful. When you contribute you will get your name placed on the homepage underneath contributions with a link to your contribution. You will also get massive respect from me, and that's a pretty cool thing. What I'm looking for in contributions is some of the following:
- Hashing algorithm creations, specifically; A quicker MD2 algorithm, full Tiger algorithms, Keychain algorithms for cloud and agile
- More wordlists to download from, please make sure that the link is encoded
- Rainbow table attack implementation
- More regular expressions to verify different hash types