Cloudtopolis: Break Hashes directly from the cloud

Cloudtopolis is a tool that helps us break a lot on the Google Cloud Shell platform, quickly and without any control.

The program is free.

 

Conditions

A Google Account

Installation

Η of Cloudtopolis takes place in two phases:

Phase 1

Access Google Cloud Shell from the following link:

https://ssh.cloud.google.com/cloudshell/editor?hl=es&fromcloudshell=true&shellonly=true

Then run the following within a terminal:

wget https://raw.githubusercontent.com/JoelGMSec/Cloudtopolis/master/Cloudtopolis.sh chmod + x Cloudtopolis.sh ./Cloudtopolis.sh

Phase 2

Access Google Colaboratory via the following link:

https://colab.research.google.com/github/JoelGMSec/Cloudtopolis/blob/master/Cloudtopolis.ipynb

It is necessary to fill in the fields in the "Requirements" section with the data you entered in Google Cloud Shell and Hashtopolis.

You can also access Hashtopolis directly from the following url:

https://ssh.cloud.google.com/devshell/proxy?authuser=0&port=8000&environment_id=default

Ή via an SSH tunnel, following the instructions that appear after running the first script.

Use

Once the installation is complete, more factors can be added, repeating phase 2 as many times as you want.

For this, it is necessary to use 1 Google Account for each execution of Colaboratory. It is not necessary to repeat phase 1 each time. You can also use other Google accounts if you have one or your friends' accounts.

Application snapshots

 

Detailed installation and use guide of the protos, you will find here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).