-
john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
If you really want to brute this thing, as /u/bobzombieslayer mentioned, you'll need to extract either the key that's been hidden/hashed, or some encrypted data, and turn that into something that John the Ripper or Hashcat can work on. And then let those run. But if it's 10+ digits with letters/numbers, that may be effectively impossible to brute, it'll be faster to disassemble the program and figure out how it works. (e.g., disable the "check password" function, or modify the stored secret to something you know how to generate, etc)
If you really want to brute this thing, as /u/bobzombieslayer mentioned, you'll need to extract either the key that's been hidden/hashed, or some encrypted data, and turn that into something that John the Ripper or Hashcat can work on. And then let those run. But if it's 10+ digits with letters/numbers, that may be effectively impossible to brute, it'll be faster to disassemble the program and figure out how it works. (e.g., disable the "check password" function, or modify the stored secret to something you know how to generate, etc)