Extracts password-protected 7-Zip archive data into hashcat-compatible hashes for password cracking.
7z2hashcat is a utility that extracts cryptographic data from password-protected 7-Zip archives and converts it into hashes that can be cracked with hashcat. It solves the problem of recovering lost passwords for encrypted .7z files by enabling efficient brute-force or dictionary attacks using GPU acceleration.
Security researchers, penetration testers, and digital forensics professionals who need to recover passwords from encrypted 7-Zip archives during security assessments or data recovery operations.
It provides a specialized, reliable method to bridge 7-Zip encryption with hashcat's cracking capabilities, offering precise hash extraction that directly integrates with the popular password recovery toolchain without requiring custom scripting.
extract information from password-protected .7z archives (and .sfx files) such that you can crack these "hashes" with hashcat
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Accurately extracts encryption metadata from 7-Zip and SFX files by parsing headers and data, ensuring compatibility with hashcat's 7-Zip mode as detailed in the hash format explanation.
Outputs hashes in the exact format required by hashcat -m 11600, allowing for direct use in GPU-accelerated cracking without additional conversion steps.
Supports multiple files and wildcard patterns in a single command, such as 'perl 7z2hashcat.pl *.7z', streamlining conversion for large sets of archives.
Provides comprehensive hash format with fields like salt, IV, CRC32, and data lengths, aiding in debugging and analysis as explained in the README's format table.
Non-Windows users must install Perl and specific modules like Compress::Raw::Lzma, which the README notes can be complex, with installation steps varying by OS.
Only handles 7-Zip archives, excluding other common formats such as ZIP, RAR, or AES-encrypted ZIP files, limiting its utility in broader password recovery scenarios.
The hash output may contain encrypted data that could be decrypted to reveal sensitive archive contents, as warned in the 'Sensitive data warning' section, requiring cautious handling.