Kraker: Breaking passwords easily and quickly

The Kraker is a brute-force program that lets you run and manage hashcat on different servers and focuses on ease of use.

Its purpose is to make password cracking an easy process even for the most novice user and the process to be as flexible as possible, combining the most popular techniques, for breaking hashes in a short time.


sudo apt update curl -fsSL -o sh rm sudo curl -L " /releases/download/1.25.3/docker-compose-$(uname -s) - $ (uname -m) "-o / usr / local / bin / docker-compose sudo chmod + x / usr / local / bin / docker-compose sudo systemctl enable docker sudo docker-compose build app sudo docker-compose up -d sudo docker-compose exec app composer install sudo docker-compose exec app php artisan key: generate sudo docker-compose exec app php artisan migrate sudo docker -compose exec app php artisan db: seed --class = HashtypeSeeder sudo docker-compose exec app php artisan db: seed --class = UserSeeder

wget -O packages-microsoft-prod.deb sudo dpkg -i packages-microsoft-prod.deb sudo apt-get update sudo apt-get install -y apt-transport-https sudo apt-get update sudo apt-get install -y dotnet-sdk-5.0


The server components are:

  • Login: admin
  • Password: cracker


Είναι γραμμένο σε .NET Core 5 και λειτουργεί σε οποιοδήποτε λειτουργικό σύστημα Linux, Windows, MacOS (σε ). Τέλος ο agent είναι υπεύθυνος για την εκτέλεση των brute-force εργασιών που λαμβάνετε από τον διακομιστή.

You will find more information about the installation and the use of the program here. The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new posts by email.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).