A tool to recover you'r encrypted ZIP files using brute-force and dictionary attack's.
- When using a wordlist, it should not exceed 600 passwords due to Python limitations. This will be fixed in future updates.
- Brute-Force Attack: Tries all possible password combinations.
- Configurable Password Length: Supports setting the maximum length of passwords to test.
- Configurable Password Length: Supports setting the maximum length of passwords to test.
- Progress Reporting: Provides feedback on the current progress of the attack.
- Python 3.x: Ensure you have Python 3.x installed. Download here.
- Clone repsitory:
https://github.com/smog-root/crackz
- Navigate to the project directory:
cd path\crackz
crackz.py [-h]
python3 crackz.py -h
python3 crackz.py -f path/file.zip -w path/wordlist.txt
-h , --help show this help message and exit
-f , --file Enter zip file path.
-w , --wordlist Enter password word list path.
-o , --output Enter output directory for extracted files.
-ex , --extract Extract files if password is found.
This project is licensed under the MIT License. See the LICENSE file for details.