abrute 0.0.2

AESCrypt Brute force attempter.
abrute-0.0.2 is not a library.

Build Status

abrute - Multi-threaded AES Brute Force File Decryption

Rather straight forward. It works but has much more improvements yet to come. This will use your CPU to the best of its ability so you may want to use this on a secondary system.

Installation

First you need to have aescrypt installed.

wget https://www.aescrypt.com/download/v3/linux/aescrypt-3.13.tgz
tar -xzf aescrypt-3.13.tgz
cd aescrypt-3.13/src
make && sudo make install
cd ../.. && rm -rf aescrypt-3.13

Next you need to have Rust installed.

curl https://sh.rustup.rs -sSf | sh

Then you can get and compile abrute.

git clone https://github.com/danielpclark/abrute.git
cd abrute
cargo build --release
sudo cp target/release/abrute /usr/bin/

Usage

USAGE:	abrute <RANGE> <CHARACTERS> [OPTIONS] [--] <TARGET>

  <RANGE>         Single digit or a range 4:6 for password length.
  <CHARACTERS>    Characters to use in password attempt. Don't use quotes unless
                  they may be in password. Backslash may escape characters such
                  as space.
  -a, --adjacent  Set a limit for allowed adjacent characters. Zero will not
                  allow any characters of the same kind to neghibor in the
                  attempts.
  <TARGET>        Target file to decrypt.
  -h, --help      Prints help information.
  -v, --version   Prints version information.

License

Licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.