A powerful, high-performance SSH brute force tool written in Go with enhanced multi-layer worker architecture, advanced honeypot detection, real-time statistics, and comprehensive system reconnaissance capabilities.
- β‘ Enhanced Multi-Layer Workers - Revolutionary concurrent processing architecture
- π 10x Performance Boost - Up to 1000+ concurrent connections per worker
- π― Advanced Honeypot Detection - 9 intelligent detection algorithms with dedicated workers
- π Real-Time Dashboard - Live progress tracking with enhanced statistics
- π― Smart Target Management - Efficient wordlist and target handling
- π Deep System Reconnaissance - Comprehensive server information gathering
- π Beautiful Output Formats - Enhanced logging with emojis and structured data
- π Cross-Platform Support - Linux, Windows, macOS compatibility
- βοΈ Intelligent Worker Management - Separate pools for SSH and honeypot detection
- π Thread-Safe Operations - Atomic operations for high-concurrency environments
- ποΈ Advanced Configuration - Timeout, stealth mode, performance tuning
- Unified Processing: Honeypot detection now runs directly in SSH processing pipeline
- Eliminated Queue Overhead: Removed separate honeypot worker queue for better performance
- Reduced Memory Usage: Simplified architecture uses 50% less memory
- Single-Layer Processing: Direct honeypot detection without additional worker layers
- Better Resource Control: More predictable CPU and memory usage patterns
- Simplified Worker Model: Removed
ServerInfoWithClient
struct and dedicated honeypot workers - Direct Detection: Honeypot detection integrated directly into
processSSHTask
- Cleaner Code: Reduced complexity with unified processing pipeline
- Better Debugging: Simpler architecture makes troubleshooting easier
- Stable Performance: More consistent resource usage without queue bottlenecks
- All 9 Honeypot Algorithms: Full detection capability preserved
- Multi-threaded Processing: 25 concurrent connections per worker maintained
- Real-time Statistics: Enhanced progress tracking and metrics
- Cross-platform Support: All platforms still supported
# Visit releases page and download for your platform:
# https://github.com/Matrix-Community-ORG/SSHCracker/releases/latest
# Make executable (Linux/macOS):
chmod +x ssh-cracker-*
# Run:
./ssh-cracker-*
# Clone repository
git clone https://github.com/Matrix-Community-ORG/SSHCracker.git
cd SSHCracker
# Build
go build ssh.go
# Run
./ssh
- Launch the tool:
./ssh-cracker-*
- Configure inputs:
- Username wordlist file (e.g.,
users.txt
) - Password wordlist file (e.g.,
passwords.txt
) - Target list file (e.g.,
targets.txt
) - Connection timeout (recommended: 5-10 seconds)
- Max concurrent connections (recommended: 10-50)
- Username wordlist file (e.g.,
Usernames (users.txt
):
root
admin
administrator
user
ubuntu
Passwords (passwords.txt
):
123456
password
admin
root
12345678
Targets (targets.txt
):
192.168.1.1:22
10.0.0.1:22
example.com:2222
SSHCracker v2.6 introduces a simplified, more efficient architecture with unified processing:
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Main Worker Pool β
β βββββββββββββββ βββββββββββββββ βββββββββββββββ β
β β Worker 1 β β Worker 2 β β Worker N β β
β β β β β β β β
β β 25 Concurrentβ β 25 Concurrentβ β 25 Concurrentβ β
β β Connections β β Connections β β Connections β β
β β β β β β β β
β β βββββββββββ β β βββββββββββ β β βββββββββββ β β
β β βHoneypot β β β βHoneypot β β β βHoneypot β β β
β β βDetectionβ β β βDetectionβ β β βDetectionβ β β
β β βEmbedded β β β βEmbedded β β β βEmbedded β β β
β β βββββββββββ β β βββββββββββ β β βββββββββββ β β
β βββββββββββββββ βββββββββββββββ βββββββββββββββ β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
- Unified Processing: SSH connection and honeypot detection in single pipeline
- Memory Efficiency: 50% reduction in memory usage vs v2.5
- Simplified Architecture: Removed separate honeypot worker queue
- Better Resource Control: More predictable CPU and memory patterns
- Speed Improvement: 20-25% faster processing with unified pipeline
Our enhanced honeypot detection uses 9 sophisticated algorithms with dedicated workers:
Algorithm | Detection Method | Performance Impact |
---|---|---|
Pattern Recognition | Known honeypot signatures | β‘ Fast |
Response Time Analysis | Unusual timing patterns | β‘ Fast |
Command Behavior | Abnormal system responses | π Medium |
File System Analysis | Fake file structures | π Medium |
Network Configuration | Suspicious port configs | π Medium |
Performance Testing | System characteristics | π Slow |
Anomaly Detection | Unusual behaviors | π Slow |
Service Analysis | Running processes | π Medium |
Environment Analysis | System variables | β‘ Fast |
β Production Ready: Enhanced accuracy with dedicated processing workers.
File | Description | Format |
---|---|---|
su-goods.txt |
Successfully cracked SSH credentials | Simple list |
detailed-results.txt |
π¨ Beautiful structured results with emojis | Enhanced format |
honeypots.txt |
Detected honeypots with confidence scores | Detailed analysis |
combo.txt |
Generated credential combinations | Temporary file |
π Ultra-High Speed Mode (v2.6 Simplified):
- Timeout: 2 seconds
- Max Connections: 100
- Concurrent per Worker: 25
- Unified Processing: Direct honeypot detection
- Memory Usage: 50% less than v2.5
π High-Speed Mode:
- Timeout: 3 seconds
- Max Connections: 50
- Use for fast networks
π₯· Stealth Mode:
- Timeout: 10 seconds
- Max Connections: 5
- Use for careful reconnaissance
- Go: Version 1.18 or higher
- Git: For cloning (if building from source)
- Network Access: To target systems
- β Linux (x64, ARM64)
- β Windows (x64)
- β macOS (Intel, Apple Silicon)
# Permission denied
chmod +x ssh-cracker-*
# Module errors
go mod download && go mod tidy
# Too many open files
ulimit -n 65536
- Adjust timeout based on network latency
- Start with lower connection counts
- Monitor system resources during scanning
- English Community: @MatrixORG
- Persian Community: @MatrixFa
- Chat Group: @DD0SChat
- Check Issues
- Join our Telegram communities
- Create detailed bug reports
π¨ Important Notice: This tool is designed for:
- β Authorized penetration testing
- β Educational purposes
- β Security research
- β Your own systems
β DO NOT USE FOR:
- Unauthorized access attempts
- Illegal activities
- Systems you don't own without permission
Users are fully responsible for compliance with applicable laws and regulations.
We welcome contributions! Here's how:
- Fork the repository
- Create your feature branch:
git checkout -b feature/AmazingFeature
- Commit your changes:
git commit -m 'Add AmazingFeature'
- Push to branch:
git push origin feature/AmazingFeature
- Open a Pull Request
This project is licensed under the MIT License - see LICENSE for details.
- Matrix Community - Development and maintenance
- Go Community - Excellent SSH libraries
- Security Researchers - Honeypot detection algorithms
- Contributors - Bug reports and feature requests
β Star this project if you find it useful! β
Made with β€οΈ by Matrix Community