This project is a practical cybersecurity toolkit that demonstrates how weak passwords are exploited and how authentication systems can be strengthened through password auditing and analysis.
This project simulates password attack techniques in a controlled, ethical lab environment and generates a detailed password security audit report.
Weak passwords are one of the most exploited vulnerabilities in cybersecurity. This project helps you understand:
- Dictionary and brute-force attack techniques
- How password hashes are stored in Linux and Windows
- Entropy and policy-based strength evaluation
- Practical password security auditing
All techniques are implemented strictly for educational and defensive security purposes.
- Dictionary generator using username and DOB patterns
- Dictionary attack simulation
- Real-time brute-force demo for short passwords
- Linux shadow hash extraction (demo)
- Windows SAM hash parsing (demo)
- Entropy-based strength calculation
- Password policy validation
- Weak password detection
- Security recommendations
- Automatic
audit_report.txtgeneration - Weak / Moderate / Strong rating
- Actionable mitigation suggestions
main.py
dictionary/
generator.py
mutations.py
attack_simulator/
dictionary_sim.py
brute_force_sim.py
hash_analysis/
hash_parser.py
hash_identifier.py
sam_parser.py
strength_analyzer/
entropy_calc.py
policy_checker.py
reporting/
audit_report.py
screenshots/
- User enters username, DOB, password
- Dictionary wordlist is generated
- Dictionary attack simulation is performed
- Entropy & policy checks are applied
- Password strength is evaluated
- Audit report is created
| Password Type | Result |
|---|---|
| Strong complex password | STRONG |
| Username + DOB pattern | WEAK |
| Numeric only password | WEAK |
Screenshots in the screenshots folder.
python main.pyProduces:
audit_report.txt
Containing:
- Entropy score
- Dictionary match result
- Policy issues
- Final rating
- Mitigation suggestions
This project is strictly for educational purposes.
No real password cracking is performed on live systems.
- Understanding password attack methods
- Understanding secure password storage
- Perform password security audits