Projects STRLCPY cupp Commits 54180adb
🤬
Revision indexing in progress... (symbol navigation in revisions will be accurate after indexed)
  • ■ ■ ■ ■ ■ ■
    README.md
    1  -# CUPP - Common User Password Profiler
    2  -This is an improved Version of CUPP.
    3  -### Added
    4  -- Hyperspeed Print.
    5  -- Colors fix.
     1 +# CUPP - Common User Passwords Profiler
     2 + 
     3 +[![Build Status](https://travis-ci.org/Mebus/cupp.svg?branch=master)](https://travis-ci.org/Mebus/cupp)
     4 +[![Coverage Status](https://coveralls.io/repos/github/Mebus/cupp/badge.svg)](https://coveralls.io/github/Mebus/cupp)
     5 +[![Codacy Badge](https://api.codacy.com/project/badge/Grade/a578dde078ef481e97a0e7eac0c8d312)](https://app.codacy.com/app/Mebus/cupp?utm_source=github.com&utm_medium=referral&utm_content=Mebus/cupp&utm_campaign=Badge_Grade_Dashboard)
     6 +[![Rawsec's CyberSecurity Inventory](https://inventory.rawsec.ml/img/badges/Rawsec-inventoried-FF5050_plastic.svg)](https://inventory.rawsec.ml/)
     7 + 
     8 +
     9 +## About
     10 + 
     11 + The most common form of authentication is the combination of a username
     12 + and a password or passphrase. If both match values stored within a locally
     13 + stored table, the user is authenticated for a connection. Password strength is
     14 + a measure of the difficulty involved in guessing or breaking the password
     15 + through cryptographic techniques or library-based automated testing of
     16 + alternate values.
     17 + 
     18 + A weak password might be very short or only use alphanumberic characters,
     19 + making decryption simple. A weak password can also be one that is easily
     20 + guessed by someone profiling the user, such as a birthday, nickname, address,
     21 + name of a pet or relative, or a common word such as God, love, money or password.
     22 + 
     23 + That is why CUPP was born, and it can be used in situations like legal
     24 + penetration tests or forensic crime investigations.
     25 + 
     26 + 
     27 +Requirements
     28 +------------
     29 + 
     30 +You need Python 3 to run CUPP.
     31 + 
     32 +Quick start
     33 +-----------
     34 + 
     35 + $ python3 cupp.py -h
     36 + 
     37 +## Options
     38 + 
     39 + Usage: cupp.py [OPTIONS]
     40 + 
     41 + -h this menu
     42 + 
     43 + -i Interactive questions for user password profiling
     44 + 
     45 + -w Use this option to profile existing dictionary,
     46 + or WyD.pl output to make some pwnsauce :)
     47 + 
     48 + -l Download huge wordlists from repository
     49 + 
     50 + -a Parse default usernames and passwords directly from Alecto DB.
     51 + Project Alecto uses purified databases of Phenoelit and CIRT which where merged and enhanced.
     52 + 
     53 + -v Version of the program
     54 + 
     55 + 
     56 + 
     57 +## Configuration
     58 + 
     59 + CUPP has configuration file cupp.cfg with instructions.
     60 + 
     61 + 
     62 +## License
     63 + 
     64 + This program is free software; you can redistribute it and/or modify
     65 + it under the terms of the GNU General Public License as published by
     66 + the Free Software Foundation; either version 3 of the License, or
     67 + any later version.
     68 + 
     69 + This program is distributed in the hope that it will be useful,
     70 + but WITHOUT ANY WARRANTY; without even the implied warranty of
     71 + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
     72 + GNU General Public License for more details.
     73 + 
     74 + You should have received a copy of the GNU General Public License
     75 + along with this program; if not, write to the Free Software
     76 + Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
     77 + 
     78 + See './LICENSE' for more information.
     79 + 
     80 +## Github import
     81 + 
     82 +This project was imported into https://github.com/Mebus/cupp by Mebus from:
     83 +http://www.remote-exploit.org/content/cupp-3.0.tar.gz
     84 +http://www.remote-exploit.org/articles/misc_research__amp_code/index.html
     85 +to encourage further development of the tool.
     86 + 
     87 +## Original author
     88 + 
     89 + Muris Kurgas aka j0rgan
     90 + [email protected]
     91 + http://www.remote-exploit.org
     92 + http://www.azuzi.me
     93 + 
     94 + 
     95 +## Contributors
     96 + 
     97 + * Bosko Petrovic aka bolexxx
     98 + [email protected]
     99 + http://www.offensive-security.com
     100 + http://www.bolexxx.net
     101 + 
     102 + * Mebus
     103 + https://github.com/Mebus/
     104 + 
     105 + * Abhro
     106 + https://github.com/Abhro/
     107 + 
     108 + * Andrea Giacomo
     109 + https://github.com/codepr
     110 +
    6 111  ### Example (Fast forwarded)
    7 112  ![cupp-example](https://github.com/lynxmk/cupp/blob/master/cupp-example.gif)
    8 113   
    9  -###### Massive Respect to developers for creating this awesome tool :100: :shipit:
    10 114   
Please wait...
Page is in error, reload to recover