Argon2id Hash Cracker
---------------------------------
| Cyclone's Argon2id Hash Cracker |
---------------------------------
Hash file: hash.txt
Valid Hashes: 4
Invalid Hashes: 1
CPU Threads: 56
Wordlist: cyclone.txt
Working...
$argon2id$v=19$m=65536,t=4,p=1$d2tycHJEYlBuenNEOUpqNg$pEXhocM661JmS3oRCR6MPQ:password
$argon2id$v=19$m=100000,t=4,p=1$cXVrNUdUVHI1SmN3RjcwNw$hMBzEYMGeblwwhj56bW6ig:password
$argon2id$v=19$m=65536,t=4,p=1$VWF5MkY2S3pYdm1nZm1HdQ$V3CVYSZuo4hAIgAPicV0NA:password1
$argon2id$v=19$m=65536,t=4,p=1$VWF5MkY2S3pYdm1nZm1HdQ$3zL8i47o4/l9rhLuDZE1oQ:passwords
Cracked: 4/4
Hashrate: 81.09/s
Runtime: 00h:00m:58s
Info:
I wrote this tool due to the limited selection of programs that can crack/verify argon2id hashes. Hashcat currently lacks support for any argon algo, and even though John the Ripper does support it in its bleeding-edge version, the high memory requirements of argon2id make it impractical for handling higher-cost memory argon2id hashes that demand more memory than most GPUs have. If your GPU allows it, I suggest running argon2id hashes with JTR first. If not, Argon2id Hash Cracker
may be your only choice as it is only limited by your system RAM and CPU.
Example hash: $argon2id$v=19$m=65536,t=4,p=1$d2tycHJEYlBuenNEOUpqNg$pEXhocM661JmS3oRCR6MPQ
Plaintext: password
Usage:
./argon_cracker -w wordlist.txt -h hashes.txt
Changelog:
c60b92295ee154d682b7065864683b6edd2ba66f29fd43ae5ac68d5b2ea9d17e argon_cracker_amd64.bin
e0df80f351923af38f97779774b08d417579c7ef9d50d5950762b81b2bb701f0 argon_cracker_amd64-darwin
84c17af55bf4ae7920deb763664cdc9314591413508b2248724d21c339a28b3c argon_cracker_amd64.exe
Jotti Antivirus Scan Results:
https://virusscan.jotti.org/en-US/filescanjob/qhi2c6bh1z,kmausm4r4y,z5qbl8oprs