Woodpecker hash Bruteforce
Fast. Simple. Reliable.

Welcome to Woodpecker hash Bruteforce official site!

Woodpecker hash Bruteforce is a very fast and powerful multithreaded hash cracker (brute-forcer) with many features including 4 attack types, session pausing and restoring, saving results to a file and much more. This is definitely the simplest tool to start cracking passwords with: only three options are required to start brute-forcing (a hash, its type and an alphabet or a wordlist as a combinations supply). The progress and the settings are shown in the command line, so you can always see what combinations are being tried right now and how many of them have been already tried. On success, the password is shown and saved to a file along with the hash and the date when it was cracked; the speed and time taken to crack this password are shown as well.

This program works on Mac OS, Linux and Windows. The code is cross-platform, so the executables for these operating systems contain the same features and provide the same speed.

The program comes in two variants: GUI- and command-line-only. The second one is updated much more frequently and thus uses the newest algorithms and other features, so it's recommended for download if you want the best performance, although the GUI version can be simpler in usage.

This website provides the program's executables for the operating systems mentioned above alongside with a comprehensive tutorial that explains how the program works and how to use it. It discusses all the available options in detail and gives many examples of real-life usage.

You can set up the brute-force process the way you want as there are many options that control it. For example, it's possible to specify the name of the file where the output will be stored, the number of threads to use (although Woodpecker hash Bruteforce attempts to guess the number of CPU cores and create a thread per core), the alphabet and dictionary to use in alphabet- and dictionary-based attacks, which are further discussed in the tutorial, and much more. It's also possible to reduce the footprint in the system by not writing any output files.

Hash types supported:

  • MD2 (deprecated, removed from versions newer than 3.0, inclusive)
  • MD4
  • MD5
  • SHA-1
  • SHA-224
  • SHA-256
  • SHA-384
  • SHA-512
  • RIPEMD-160
  • Keccak (since v. 3.0)
  • Tiger (since v. 3.0)
  • Skein (since v. 3.0)

Attack types:
  • Alphabet-based
  • Dictionary-based
  • Mask-based
  • Randomised