A hash cracking tool with a GUI. It supports wordlist, brute-force, rule-based, rainbow table, and AI-driven attack modes. The AI mode uses a GPT-2 style transformer model trained specifically for password generation.
- Attack Modes: Wordlist, brute-force, rule-based, probabilistic (AI), and rainbow tables
- Hash Algorithms: MD5, SHA family, bcrypt, BLAKE2, and 20+ others
- AI Mode: A custom GPT-2 style model that generates and predicts likely passwords
- Rainbow Tables: Bloom filter optimized storage backed by SQLite
- GUI: Dark theme with real-time progress tracking
The probabilistic mode runs an autoregressive transformer (see src/train.py) that predicts the next token in a sequence. You can tune the number of layers, attention heads, and embedding dimensions. It works the same way GPT-2 does — given a partial password, it predicts what comes next.
Download from Releases and run PolycryptZero.exe. No Python needed.
git clone https://github.com/bitArtisan1/p0-Decryption-Tool.git
cd p0-Decryption-Tool
pip install -r requirements.txt
python src/main.pyRequirements
- Python 3.11+
customtkinter,pycryptodome,numpy,onnxruntime,transformers
- Enter the hash you want to crack
- Select the algorithm
- Pick an attack mode
- Set up any required parameters (wordlist path, character set, etc.)
- Hit start
For wordlist and rule-based modes, you'll need a password list. rockyou.txt is a common choice:
curl -LO https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txtFor probabilistic mode, point it at the included onnx_model-output directory.
- Wordlist: Hashes each entry in a password list and compares
- Brute-force: Tries every combination for a given character set and length
- Rule-based: Takes a wordlist and applies transformations like capitalization, leet speak substitutions, etc.
- Probabilistic: The AI model generates candidate passwords based on learned patterns. Point it at
onnx_model_output - Rainbow Table: Looks up precomputed hashes
- Improve model architecture for better pattern matching
- Linux release
- CUDA support for probabilistic mode
This tool is for educational and personal use only. It's meant to demonstrate how password hashing, security vulnerabilities, and cracking techniques work.
By using it, you agree that:
- You're responsible for how you use it and any consequences that follow
- Using it to access accounts or systems you don't have permission to access is not allowed
- The developers aren't liable for any legal or ethical issues that come from misuse
- It should not be used for anything illegal or malicious
Use it responsibly and within the law. The name PolycryptZero™ and logo are not covered by the open-source license and may not be used in derivative projects or forks without permission.
If you find this useful — star the repo, share it, or send feedback. It helps.
For issues or feature requests, open an issue on GitHub.


