08-06-2025, 12:08 PM
(This post was last modified: 08-06-2025, 12:51 PM by soujinsan69.)
Crack SHA1 from BreachDirectory Partial Passwords
If you're trying to check someone's breached password on IntelX or DeHashed, you always see that it needs a PRO version to view results. Disgusting, right? And you're the type who always wants FREE stuff. But then you find BreachDirectory it shows some part of the password, but the rest is censored like:
- Bluef****
- Skibidi****
So what is SHA1?
SHA1 is a hashing algorithm. It turns plain text (like a password) into a fixed-length string that looks random. It’s one-way, but if you know part of the password and have the hash, you can brute-force the rest.
You’ll see something like this on BreachDirectory:
Password: bluef****
Hash: 6468adb55b27ba6b4345c84dbbec5544d6c4c5c0
They show you the first few characters, then censor the rest but they give the full SHA1 hash. This tool fills that gap.
You just input the known prefix and the SHA1 hash, and it brute-forces the rest until it finds the match. No GPU needed. Lightweight. Works on Linux, Windows, even Termux.
I’ve got the solution with this code:
Quote:Script Type: Python CLI Tool
Input: SHA1 Hash + Known Password Prefix
Output: Full Matching Password
Estimated Speed: ~0.01 seconds per try
Max Password Length: Configurable
Use Case: Brute-forcing censored passwords from BreachDirectory
Dependencies: hashlib, itertools
Platform: Windows / Linux / Termux
File Type: .py
Author: Awiones
URL for the source code:
(note: replace your own hash and prefix okay :3)
Sample dump output:
PASSWORD FOUND: Hazelnut1
Time taken: 1.19 seconds
Verification:
Target : 93b05160c938a5ac5fb9c5732014aa830eecdf70
Found : 93b05160c938a5ac5fb9c5732014aa830eecdf70
Match : True
PASSWORD FOUND: bluefire
Time taken: 0.87 seconds
Verification:
Target : 6468adb55b27ba6b4345c84dbbec5544d6c4c5c0
Found : 6468adb55b27ba6b4345c84dbbec5544d6c4c5c0
Match : True
PASSWORD FOUND: tigerkilla
Time taken: 3.56 seconds
Verification:
Target : e5c41e279b1282fdc1a6d21b2485e28c9834550d
Found : e5c41e279b1282fdc1a6d21b2485e28c9834550d
Match : True
PASSWORD FOUND: sunsetdreams
Time taken: 5.02 seconds
Verification:
Target : a3fcee4f372c1469f7e17613dcde1e98b899f680
Found : a3fcee4f372c1469f7e17613dcde1e98b899f680
Match : True
PASSWORD FOUND: jellycat123
Time taken: 7.42 seconds
Verification:
Target : 41d1d0dcdccf1ac01f3e474b5085b89b83e4af4a
Found : 41d1d0dcdccf1ac01f3e474b5085b89b83e4af4a
Match : True
Hope this helps you without paying just to look up one password.