SSHCracker
A powerful (SSH Cracker) and efficient SSH connection testing tool written in Go. Features include multi-threaded testing, real-time progress monitoring, Discord webhook integration, and a robust license system. Perfect for network administrators and security professionals to test SSH connection security.
Install / Use
/learn @Matrix-Community-ORG/SSHCrackerREADME
🚀 SSHCracker v3.0 Beta - Advanced SSH Brute Force Tool
A powerful, high-performance SSH brute force tool written in Go with advanced honeypot detection, professional input system, pause/resume capability, and comprehensive system reconnaissance.
📚 New to SSHCracker? Check out our Complete Wiki Guide for step-by-step instructions!
👨💻 Developer
SudoLite
🌟 Key Features
🔥 Core Capabilities
- ⚡ Enhanced Multi-Layer Workers - Revolutionary concurrent processing architecture
- 🚀 High Performance - Up to 1000+ concurrent connections
- 🍯 Advanced Honeypot Detection - 11 intelligent detection algorithms
- 📊 Real-Time Dashboard - Live progress tracking with beautiful UI
- ⏸️ Pause/Resume - Press Ctrl+C to pause, resume anytime
- 💾 Auto-Save - Automatic progress saving every 5 minutes
- 🔍 Deep System Reconnaissance - Comprehensive server information gathering
- 📁 Beautiful Output Formats - Enhanced logging with emojis
🛡️ Security & Performance
- 🚀 Cross-Platform Support - Linux, Windows, macOS
- ⚙️ Intelligent Worker Management - Optimized concurrent processing
- 🔒 Thread-Safe Operations - Atomic operations for high-concurrency
- 🎛️ Professional Input System - Validation, defaults, and colors
🆕 What's New in v3.0 Beta
⏸️ Pause/Resume System (NEW!)
- Press Ctrl+C to gracefully pause the scan
- State automatically saved to
paused.json - Resume anytime with
./sshcracker --resume - Auto-save every 5 minutes for crash protection
- All progress, stats, and successful IPs preserved
🎯 Professional Input System (NEW!)
- Interactive prompts with validation
- Default values - Just press Enter for common settings
- Colored feedback - Green ✓ for valid, Red ✗ for invalid
- File existence checking - Prevents typos and errors
- Scan summary with confirmation before starting
🍯 Enhanced Honeypot Detection (IMPROVED!)
- 11 detection algorithms (was 9)
- Command Timing Analysis - Detects uniform response patterns
- SSH Banner Fingerprinting - Identifies known honeypot signatures
- Dynamic Threshold - Smart scoring based on test results
- 30+ honeypot signatures - Extended detection database
- Reduced false positives - Better accuracy
🖥️ CLI Flags (NEW!)
./sshcracker --help # Show help
./sshcracker --resume # Resume from paused.json
./sshcracker --resume-file X # Resume from custom file
🚀 Quick Start
Option 1: Download Pre-built Binary (Recommended)
# Visit releases page and download for your platform:
# https://github.com/Matrix-Community-ORG/SSHCracker/releases/latest
# Make executable (Linux/macOS):
chmod +x sshcracker
# Run:
./sshcracker
Option 2: Build from Source
# Clone repository
git clone https://github.com/Matrix-Community-ORG/SSHCracker.git
cd SSHCracker
# Download dependencies
go mod tidy
# Build
go build -o sshcracker ssh.go
# Run
./sshcracker
📋 Usage Guide
Interactive Mode (Default)
./sshcracker
The tool will guide you through:
- Username list - Path to file with usernames
- Password list - Path to file with passwords
- IP list - Path to file with targets (ip:port format)
- Timeout - Connection timeout in seconds (default: 10)
- Workers - Number of concurrent workers (default: 100)
Resume Mode
# Resume from paused.json
./sshcracker --resume
# Resume from custom file
./sshcracker --resume-file myscan.json
File Format Examples
Usernames (users.txt):
root
admin
user
ubuntu
Passwords (passwords.txt):
123456
password
admin
root
Targets (targets.txt):
192.168.1.1:22
10.0.0.1:22
example.com:2222
🍯 Advanced Honeypot Detection System v3.0
Our enhanced honeypot detection uses 11 sophisticated algorithms:
| Algorithm | Detection Method | Score Impact | |-----------|------------------|--------------| | Pattern Recognition | Known honeypot signatures (30+) | +3 per match | | Response Time Analysis | Unusual timing patterns | +2 | | Command Timing Analysis | Low variance in response times | +2 | | SSH Banner Analysis | Known honeypot SSH versions | +3 | | File System Analysis | Fake/empty directories | +1 per indicator | | Process Analysis | Honeypot processes running | +2 per match | | Network Configuration | Missing/fake network config | +1 per indicator | | Behavioral Tests | File creation, command execution | +1-2 | | Anomaly Detection | Suspicious hostname, uptime | +1 | | Advanced Tests | CPU info, kernel, services | +1 per indicator | | Performance Tests | I/O speed, network connections | +1-2 |
Dynamic Threshold
- Threshold automatically adjusts based on successful tests
- Minimum: 5 | Maximum: 8 | Default: ~6
- Prevents false positives when some tests fail
📊 Output Files
| File | Description |
|------|-------------|
| su-goods.txt | Successful credentials (ip:port@user:pass) |
| detailed-results.txt | Full details with system info |
| honeypots.txt | Detected honeypots with scores |
| paused.json | Scan state for resume |
| autosave.json | Auto-saved state (every 5 min) |
⚙️ Performance Modes
🚀 Ultra-High Speed Mode
Timeout: 3 seconds
Workers: 100
Best for: Fast networks, many targets
🏃 Balanced Mode (Recommended)
Timeout: 10 seconds (default)
Workers: 100 (default)
Best for: Most scenarios
🥷 Stealth Mode
Timeout: 15 seconds
Workers: 10
Best for: Avoiding detection
🔧 Installation Requirements
Prerequisites
- Go: Version 1.21 or higher
- Git: For cloning (if building from source)
Dependencies
golang.org/x/crypto - SSH client library
github.com/manifoldco/promptui - Interactive input
github.com/spf13/pflag - CLI flags
Supported Platforms
- ✅ Linux (x64, ARM64)
- ✅ Windows (x64)
- ✅ macOS (Intel, Apple Silicon)
🛠️ Troubleshooting
Common Issues
# Permission denied
chmod +x sshcracker
# Module errors
go mod tidy
# Too many open files
ulimit -n 65536
Resume Issues
# Check if paused.json exists
ls -la paused.json
# View saved state
cat paused.json | jq .
📱 Community & Support
🌐 Join Our Communities
- English Community: @MatrixORG
- Persian Community: @MatrixFa
- Chat Group: @DD0SChat
💬 Get Help
⚠️ Legal & Ethical Use
🚨 Important Notice: This tool is designed for:
- ✅ Authorized penetration testing
- ✅ Educational purposes
- ✅ Security research
- ✅ Your own systems
❌ DO NOT USE FOR:
- Unauthorized access attempts
- Illegal activities
- Systems you don't own without permission
Users are fully responsible for compliance with applicable laws.
🤝 Contributing
We welcome contributions! See CONTRIBUTING.md for guidelines.
- Fork the repository
- Create your feature branch:
git checkout -b feature/AmazingFeature - Commit your changes:
git commit -m 'Add AmazingFeature' - Push to branch:
git push origin feature/AmazingFeature - Open a Pull Request
📄 License
This project is licensed under the MIT License - see LICENSE for details.
🏆 Acknowledgments
- SudoLite - Lead Developer
- Matrix Community - Maintenance and support
- Go Community - Excellent SSH libraries
- Security Researchers - Honeypot detection algorithms
<div align="center">
⭐ Star this project if you find it useful! ⭐
Made with ❤️ by SudoLite & Matrix Community
</div>Related Skills
node-connect
329.0kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
81.1kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
329.0kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
commit-push-pr
81.1kCommit, push, and open a PR
