The Web Local





cudadbcracker is a salted SHA-1 cracker for cracking database password hashes using CUDA enabled videocards. cudadbcracker was developed using NVIDIA CUDA Software Development Kit (CUDA SDK) Version 2.1. cudadbcracker currently supports MSSQL and Oracle 11g hashes.


  • Cracking multiple password hashes (max. 999)

  • Session handling (cracking can be interrupted and continued later)

  • Logging cracked password

  • Optional character set selection


It is available from here




Download and extract, execute





* -h, --hashtype=<hashtype>           Type of hashes to load (mssql,ora11g).
* -i, --inputfile=<inputfile>                 Name of input file.
-s, --sessionfile=<sessionfile>        Name of session file. Default is "".
-l, --loadsession=<loadsession>    Name of session file to load.
-r, --record=<record>                       Name of record file. Default is "default.rec".
-c, --charset=<charset>                   Character set used for cracking (combo of 'u'pper, 'l'ower,'n'umeric and 's'pecial). Default is "un".
-n, --numstreams=<numstreams>  Number of streams. Default value:1
-k, --kernels=<kernels>                    Number of kernels per streams. Default value:1
-v, --view                                            View GPU information about CUDA enabled devices.
-d, --device=<device>                      Selected CUDA device index. If not given, the default is auto select.

* = required parameter


cudadbcracker.exe -h <hashtype> -i <inputfile> -s <sessionfile> -l <loadsession> -r <record> -c <charset> -n <numstreams> -k <kernels> -v -d <device>


Show available GPUs:
cudadbcracker.exe -v

Crack MSSQL hashes:
cudadbcracker.exe -h mssql -c un -i mssqltest.hashes

Cracking Oracle 11g hashes:
cudadbcracker.exe -h ora11g -c uln -k 2 -n 2 -i ora11gtest.hashes

Continuing a saved session:
cudadbcracker.exe -l

Running tests:
Start mssql_test.cmd or ora11g_test.cmd.


IT Security News:



Pen Testing Framework: