Advanced password cracking tool with modern GUI built using PyQt6. Features multiple attack types including dictionary attacks, brute force, rule-based attacks, and more.
This project is intended for educational purposes, security research, and authorized penetration testing only.
You must own the target system or have explicit permission to test it. The author is not responsible for misuse or illegal activity.
-
Multiple Attack Types:
- Dictionary Attack (WPA2)
- Brute Force Attack
- Rule-based Attack
- Hybrid Attack
- Mask Attack
- Combinator Attack
- PIN Code Attack
-
Advanced Features:
- Real-time progress monitoring
- Speed and ETA calculations
- Comprehensive logging
- Pause/Resume functionality
- Checkpoint saving for resume capability
- Modern PyQt6 GUI
- Multiple mutation rules for rule-based attacks
-
GUI Features:
- Dashboard with live statistics
- Attack log viewer
- Results panel
- Configuration panel
- Progress bars and status indicators
- Clone or download the repository
- Install dependencies:
pip install -r requirements.txt
The tool provides native packages for different platforms:
# Build Debian package
./packaging/linux/deb/build_deb.sh
# Or use the universal build script
./build_packages.sh# Build RPM package
./packaging/linux/rpm/build_rpm.sh
# Or use the universal build script
./build_packages.sh# Build DMG installer
./packaging/macos/build_dmg.sh
# Or use the universal build script
./build_packages.shRun the tool in a container:
# Build and run with Docker
docker build -t keyspace .
docker run -it --rm keyspace
# Or use Docker Compose for full stack
docker-compose upRun the tool with the graphical interface:
python main.pyOr use the provided batch file:
start.batYou can also pre-configure attacks via command line:
python main.py --target "demo_target" --attack-type "Brute Force Attack" --min-length 8 --max-length 12Uses a wordlist file to test passwords against a target. Requires a wordlist file.
Generates all possible combinations within the specified character set and length range.
Applies various mutation rules to base passwords from a wordlist, including:
- Case variations
- Leet speak
- Number appending/prepending
- Special character insertion
- Keyboard walk patterns
- And more
Combines dictionary words with common additions (numbers, special chars, etc.)
Uses password masks (like Hashcat) to generate specific patterns.
Combines words from two wordlists.
Specialized attack for numeric PIN codes of various lengths.
- Target: The target to attack (SSID, username, etc.)
- Attack Type: Select from available attack methods
- Wordlist: Path to wordlist file (required for some attacks)
- Min/Max Length: Password length range for brute force
- Charset: Characters to use in brute force generation
The tool includes various performance optimizations:
- Memory-efficient processing
- Batch processing
- Speed monitoring with moving averages
- Error handling and recovery
The main window is divided into several panels:
- Attack Configuration: Set up your attack parameters
- Dashboard: Live statistics and progress
- Attack Log: Detailed logging of attack progress
- Statistics: Performance metrics and analysis
- Results: Found passwords and attack outcomes
WARNING: This tool is for educational and security research purposes only. Unauthorized use against systems you don't own may be illegal. Always obtain proper authorization before performing security testing.
- Python 3.8+
- PyQt6
- Windows/Linux/macOS
This project is for educational purposes. Use responsibly.
Contributions welcome! Please ensure all code follows security best practices and includes proper error handling.