Crack-A-Mauz is a professional-grade, multi-mode brute-force tool built for offensive security professionals, CTF players, and pentesters. It supports both classic dictionary-based brute-force attacks and rainbow table lookups, with optional proxy support and smart login detection. Built with customization, speed, and usability in mind.
Created by mauzware
Works on Linux 🐧 and Windows 🧩
Fast, powerful, and customizable ⚙️
-
🧩 Hash identification and cracking
-
🔑 Username & password brute-force attacks
-
🌈 Rainbow table attacks (hash:plain format)
-
🚀 Speed modes: slow, standard, and fast
-
🔁 Auto-rate limiting on server errors
-
🧠 Smart login detection with keyword analysis
-
🌍 Proxy support (Burp Suite or custom list)
-
🎯 Beautiful output with live progress updates
-
💾 Saves successful hits to dict_hits.txt and rainbow_hits.txt
Make sure you have Python 3.9+ installed (tested on 3.13+).
You can use either pip or pip3, whichever works on your system depending on your Python version.
Windows/Debian/Ubuntu
git clone https://github.com/mauzware/Crack-A-Mauz.git
cd Crack-A-Mauz
pip install -r requirements.txt
Kali Linux
In Kali, all modules are already preinstalled except colorlog
sudo apt install python3-colorlog
git clone https://github.com/mauzware/Crack-A-Mauz.git
cd Crack-A-Mauz
If you are missing some modules by any chance, you can install them with:
- Create a virtual environment and use: pip3 install -r requirements.txt
- Install them manually with apt: sudo apt install python3-[module_name]
Virtual Environment Setup
sudo apt update
sudo apt install python3-venv -y
git clone https://github.com/mauzware/Crack-A-Mauz.git
cd Crack-A-Mauz
python3 -m venv crackamauz-env
source crackamauz-env/bin/activate
pip install -r requirements.txt
deactivate
-
requests -
colorlog -
termcolor -
tqdm -
bs4 (BeautifulSoup4)
python3 crackamauz.py
python crackamauz.py
Choose from the following modes:
[1] Identify Hash
[2] Cracks Hashes
[3] Brute Force - Dictionary Attack
[4] Brute Force - Rainbow Table Attack
[0] Exit
🔐 Brute Force Attack
-
Provide a target login URL
-
Enter paths to username & password wordlists
-
Choose speed: slow, standard, fast
-
Optional: Proxy usage via Burp or custom list
🌈 Rainbow Attack
-
Provide target login URL
-
Enter a static username
-
Provide a rainbow table in
hash:passwordformat -
Optional: Proxy usage via Burp or custom list
📄 Example rainbow table format
5f4dcc3b5aa765d61d8327deb882cf99:password
d8578edf8458ce06fbc5bb76a58c5ca4:qwerty
e10adc3949ba59abbe56e057f20f883e:123456
📁 Output
-
Valid credentials from brute-force saved to:
dict_hits.txt[2025-05-12 16:03:31]http://testing.mauz/dvwa/login.php => Username: admin | Password: password -
Rainbow mode matches saved to:
rainbow_hits.txt[2025-05-13 00:10:25]http://testing.mauz/dvwa/login.php => Username: admin | Password: password
📌 Notes
-
Works best on targets that do not use JavaScript-based logins
-
CSRF token support is not implemented yet, it will be in version 2.0
Hash identification and cracking
Dictionary attack without proxy
Dictionary attack with proxy
Rainbow table attack without proxy
Rainbow table attack with proxy
All testing was conducted exclusively on DVWA (Damn Vulnerable Web Application) in a controlled lab environment for educational and research purposes only.
This tool is intended for authorized testing in environments you own or have explicit permission to test.
-
Additional support for other protocols/services (FTP, SSH)
-
Smart field detection with BeautifulSoup
-
Parallel multi-URL brute forcing
-
Proxy rotation + Tor support
-
Smarter CSRF Token handling
-
Additional output formats
-
Integrated hash identifier module
-
Many more
Crack-A-Mauz was engineered with passion by Mauzalyzer.
If you like the project, consider ⭐️ starring the repo and following for more tools.
This project is open-source and distributed under the terms of the MIT License. You are free to use, modify, and distribute it with proper attribution.








