Skip to content

A powerful (SSH Cracker) and efficient SSH connection testing tool written in Go. Features include multi-threaded testing, real-time progress monitoring, Discord webhook integration, and a robust license system. Perfect for network administrators and security professionals to test SSH connection security.

License

Notifications You must be signed in to change notification settings

Matrix-Community-ORG/SSHCracker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

16 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸš€ SSHCracker v2.6 - Advanced SSH Brute Force Tool

Go Version License Platform Release Version

A powerful, high-performance SSH brute force tool written in Go with enhanced multi-layer worker architecture, advanced honeypot detection, real-time statistics, and comprehensive system reconnaissance capabilities.

🌟 Key Features

πŸ”₯ Core Capabilities

  • ⚑ Enhanced Multi-Layer Workers - Revolutionary concurrent processing architecture
  • πŸš€ 10x Performance Boost - Up to 1000+ concurrent connections per worker
  • 🍯 Advanced Honeypot Detection - 9 intelligent detection algorithms with dedicated workers
  • πŸ“Š Real-Time Dashboard - Live progress tracking with enhanced statistics
  • 🎯 Smart Target Management - Efficient wordlist and target handling
  • πŸ” Deep System Reconnaissance - Comprehensive server information gathering
  • πŸ“ Beautiful Output Formats - Enhanced logging with emojis and structured data

πŸ›‘οΈ Security & Performance

  • πŸš€ Cross-Platform Support - Linux, Windows, macOS compatibility
  • βš™οΈ Intelligent Worker Management - Separate pools for SSH and honeypot detection
  • πŸ”’ Thread-Safe Operations - Atomic operations for high-concurrency environments
  • πŸŽ›οΈ Advanced Configuration - Timeout, stealth mode, performance tuning

πŸ†• What's New in v2.6

🎯 Simplified Architecture & Enhanced Performance

  • Unified Processing: Honeypot detection now runs directly in SSH processing pipeline
  • Eliminated Queue Overhead: Removed separate honeypot worker queue for better performance
  • Reduced Memory Usage: Simplified architecture uses 50% less memory
  • Single-Layer Processing: Direct honeypot detection without additional worker layers
  • Better Resource Control: More predictable CPU and memory usage patterns

πŸš€ Technical Improvements

  • Simplified Worker Model: Removed ServerInfoWithClient struct and dedicated honeypot workers
  • Direct Detection: Honeypot detection integrated directly into processSSHTask
  • Cleaner Code: Reduced complexity with unified processing pipeline
  • Better Debugging: Simpler architecture makes troubleshooting easier
  • Stable Performance: More consistent resource usage without queue bottlenecks

πŸ›‘οΈ Maintained Features

  • All 9 Honeypot Algorithms: Full detection capability preserved
  • Multi-threaded Processing: 25 concurrent connections per worker maintained
  • Real-time Statistics: Enhanced progress tracking and metrics
  • Cross-platform Support: All platforms still supported

πŸš€ Quick Start

Option 1: Download Pre-built Binary (Recommended)

# Visit releases page and download for your platform:
# https://github.com/Matrix-Community-ORG/SSHCracker/releases/latest

# Make executable (Linux/macOS):
chmod +x ssh-cracker-*

# Run:
./ssh-cracker-*

Option 2: Build from Source

# Clone repository
git clone https://github.com/Matrix-Community-ORG/SSHCracker.git
cd SSHCracker

# Build
go build ssh.go

# Run
./ssh

πŸ“‹ Usage Guide

Basic Usage

  1. Launch the tool: ./ssh-cracker-*
  2. Configure inputs:
    • Username wordlist file (e.g., users.txt)
    • Password wordlist file (e.g., passwords.txt)
    • Target list file (e.g., targets.txt)
    • Connection timeout (recommended: 5-10 seconds)
    • Max concurrent connections (recommended: 10-50)

File Format Examples

Usernames (users.txt):

root
admin
administrator
user
ubuntu

Passwords (passwords.txt):

123456
password
admin
root
12345678

Targets (targets.txt):

192.168.1.1:22
10.0.0.1:22
example.com:2222

πŸš€ Simplified Multi-Layer Worker Architecture

🎯 Streamlined Performance System (v2.6 Optimized)

SSHCracker v2.6 introduces a simplified, more efficient architecture with unified processing:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                    Main Worker Pool                         β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”        β”‚
β”‚  β”‚   Worker 1  β”‚  β”‚   Worker 2  β”‚  β”‚   Worker N  β”‚        β”‚
β”‚  β”‚             β”‚  β”‚             β”‚  β”‚             β”‚        β”‚
β”‚  β”‚ 25 Concurrentβ”‚  β”‚ 25 Concurrentβ”‚  β”‚ 25 Concurrentβ”‚        β”‚
β”‚  β”‚ Connections β”‚  β”‚ Connections β”‚  β”‚ Connections β”‚        β”‚
β”‚  β”‚             β”‚  β”‚             β”‚  β”‚             β”‚        β”‚
β”‚  β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚  β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚  β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚        β”‚
β”‚  β”‚ β”‚Honeypot β”‚ β”‚  β”‚ β”‚Honeypot β”‚ β”‚  β”‚ β”‚Honeypot β”‚ β”‚        β”‚
β”‚  β”‚ β”‚Detectionβ”‚ β”‚  β”‚ β”‚Detectionβ”‚ β”‚  β”‚ β”‚Detectionβ”‚ β”‚        β”‚
β”‚  β”‚ β”‚Embedded β”‚ β”‚  β”‚ β”‚Embedded β”‚ β”‚  β”‚ β”‚Embedded β”‚ β”‚        β”‚
β”‚  β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚  β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚  β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚        β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜        β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ“Š Performance Metrics (v2.6 Improvements)

  • Unified Processing: SSH connection and honeypot detection in single pipeline
  • Memory Efficiency: 50% reduction in memory usage vs v2.5
  • Simplified Architecture: Removed separate honeypot worker queue
  • Better Resource Control: More predictable CPU and memory patterns
  • Speed Improvement: 20-25% faster processing with unified pipeline

🍯 Advanced Honeypot Detection System

Our enhanced honeypot detection uses 9 sophisticated algorithms with dedicated workers:

Algorithm Detection Method Performance Impact
Pattern Recognition Known honeypot signatures ⚑ Fast
Response Time Analysis Unusual timing patterns ⚑ Fast
Command Behavior Abnormal system responses πŸ”„ Medium
File System Analysis Fake file structures πŸ”„ Medium
Network Configuration Suspicious port configs πŸ”„ Medium
Performance Testing System characteristics 🐌 Slow
Anomaly Detection Unusual behaviors 🐌 Slow
Service Analysis Running processes πŸ”„ Medium
Environment Analysis System variables ⚑ Fast

βœ… Production Ready: Enhanced accuracy with dedicated processing workers.

πŸ“Š Enhanced Output Files

File Description Format
su-goods.txt Successfully cracked SSH credentials Simple list
detailed-results.txt 🎨 Beautiful structured results with emojis Enhanced format
honeypots.txt Detected honeypots with confidence scores Detailed analysis
combo.txt Generated credential combinations Temporary file

βš™οΈ Advanced Configuration

Performance Modes

πŸš€ Ultra-High Speed Mode (v2.6 Simplified):

  • Timeout: 2 seconds
  • Max Connections: 100
  • Concurrent per Worker: 25
  • Unified Processing: Direct honeypot detection
  • Memory Usage: 50% less than v2.5

πŸƒ High-Speed Mode:

  • Timeout: 3 seconds
  • Max Connections: 50
  • Use for fast networks

πŸ₯· Stealth Mode:

  • Timeout: 10 seconds
  • Max Connections: 5
  • Use for careful reconnaissance

πŸ”§ Installation Requirements

Prerequisites

  • Go: Version 1.18 or higher
  • Git: For cloning (if building from source)
  • Network Access: To target systems

Supported Platforms

  • βœ… Linux (x64, ARM64)
  • βœ… Windows (x64)
  • βœ… macOS (Intel, Apple Silicon)

πŸ› οΈ Troubleshooting

Common Issues

# Permission denied
chmod +x ssh-cracker-*

# Module errors
go mod download && go mod tidy

# Too many open files
ulimit -n 65536

Performance Tips

  • Adjust timeout based on network latency
  • Start with lower connection counts
  • Monitor system resources during scanning

πŸ“± Community & Support

🌐 Join Our Communities

πŸ’¬ Get Help

  1. Check Issues
  2. Join our Telegram communities
  3. Create detailed bug reports

⚠️ Legal & Ethical Use

🚨 Important Notice: This tool is designed for:

  • βœ… Authorized penetration testing
  • βœ… Educational purposes
  • βœ… Security research
  • βœ… Your own systems

❌ DO NOT USE FOR:

  • Unauthorized access attempts
  • Illegal activities
  • Systems you don't own without permission

Users are fully responsible for compliance with applicable laws and regulations.

🀝 Contributing

We welcome contributions! Here's how:

  1. Fork the repository
  2. Create your feature branch: git checkout -b feature/AmazingFeature
  3. Commit your changes: git commit -m 'Add AmazingFeature'
  4. Push to branch: git push origin feature/AmazingFeature
  5. Open a Pull Request

πŸ“„ License

This project is licensed under the MIT License - see LICENSE for details.

πŸ† Acknowledgments

  • Matrix Community - Development and maintenance
  • Go Community - Excellent SSH libraries
  • Security Researchers - Honeypot detection algorithms
  • Contributors - Bug reports and feature requests

⭐ Star this project if you find it useful! ⭐

Made with ❀️ by Matrix Community

About

A powerful (SSH Cracker) and efficient SSH connection testing tool written in Go. Features include multi-threaded testing, real-time progress monitoring, Discord webhook integration, and a robust license system. Perfect for network administrators and security professionals to test SSH connection security.

Topics

Resources

License

Security policy

Stars

Watchers

Forks

Packages

No packages published

Languages