openclaw 网盘下载
OpenClaw

技能详情(站内镜像,无评论)

首页 > 技能库 > ZipCracker

The ultimate, high-performance ZIP password cracking suite by Hx0 Team. Empowers the Agent with autonomous CTF-level cracking workflows, dynamic dictionary g...

金融与交易

许可证:MIT-0

MIT-0 ·免费使用、修改和重新分发。无需归因。

版本:v2.0.0

统计:⭐ 0 · 247 · 1 current installs · 1 all-time installs

0

安装量(当前) 1

🛡 VirusTotal :可疑 · OpenClaw :良性

Package:asaotomo/zipcracker

安全扫描(ClawHub)

  • VirusTotal :可疑
  • OpenClaw :良性

OpenClaw 评估

ZipCracker's code and instructions are consistent with its stated purpose (ZIP password cracking) but it performs environment-modifying actions (auto pip installs), writes files, and asks the agent to generate/execute Python scripts from user-provided OSINT — so use in an isolated/trusted environment and avoid supplying sensitive data.

目的

Name, description, SKILL.md, README, included password list and ZipCracker.py all align: this is a ZIP password cracking tool. The only minor inconsistency is that the registry metadata lists no required binaries while SKILL.md declares a dependency on 'python3' (expected for this tool).

说明范围

SKILL.md instructs the agent to run ZipCracker.py and, for advanced attacks, to autonomously generate and execute Python scripts/dictionaries based on user-supplied OSINT. That is coherent for cracking workflows, but it grants the agent authority to create and run arbitrary code in the workspace and to request potentially sensitive contextual data from users (names, years, habits).

安装机制

No install spec in registry (low friction), but the included script will auto-install a dependency (pyzipper) by invoking pip at runtime via subprocess.check_call. Dynamic pip installs change the host Python environment and can be risky if run in shared/system Python — this behavior is explicit in code and SKILL.md.

证书

The skill declares no required environment variables or credentials (appropriate). However, it requests user-provided OSINT in order to build custom dictionaries; that is necessary for its advanced strategies but could expose private or sensitive information if provided. The code does not appear to exfiltrate data to remote endpoints.

持久

The skill does not request 'always: true' and does not attempt to modify other skills or system-wide agent settings. It will write output (unzipped_files) and generated dictionaries to the workspace and may install pyzipper into the running Python environment; those are local effects consistent with its function.

综合结论

This skill appears to do what it says: local ZIP-password cracking. Before installing or running it: 1) Run it only in an isolated environment (container, VM, or dedicated machine) because it may call pip to install 'pyzipper' into the active Python environment and will write files to disk. 2) Do not provide sensitive personal data or secrets as 'OSINT' input — the agent will use any provided strings to generate and execute brute-force diction…

安装(复制给龙虾 AI)

将下方整段复制到龙虾中文库对话中,由龙虾按 SKILL.md 完成安装。

请把本段交给龙虾中文库(龙虾 AI)执行:为本机安装 OpenClaw 技能「ZipCracker」。简介:The ultimate, high-performance ZIP password cracking suite by Hx0 Team. Empower…。
请 fetch 以下地址读取 SKILL.md 并按文档完成安装:https://raw.githubusercontent.com/openclaw/skills/refs/heads/main/skills/asaotomo/zipcracker/SKILL.md
(来源:yingzhi8.cn 技能库)

SKILL.md

打开原始 SKILL.md(GitHub raw)

---
name: zipcracker
version: 2.0.0
description: The ultimate, high-performance ZIP password cracking suite by Hx0 Team. Empowers the Agent with autonomous CTF-level cracking workflows, dynamic dictionary generation, mask attacks, and AES auto-resolution.
author: asaotomo
tags:
  - security
  - ctf
  - cryptography
  - password-recovery
  - red-team
requires:
  - binary: "python3"
---
# ZipCracker Ultimate Skill: The Hx0 Tactical Manual

You are now equipped with `ZipCracker.py`, the most comprehensive ZIP decryption tool available. Your goal is not just to run commands, but to think like a senior cybersecurity expert and CTF problem solver.

## 🧠 The Agent Design Philosophy (How to Think)
Never blindly brute-force. Password cracking is an art of narrowing down the search space. Follow the **"Cost-Ascending Tactical Pipeline"**:
1.  **Zero-Cost:** Is it pseudo-encrypted? (Tool handles this automatically).
2.  **Low-Cost (Math):** Can we collide the hash? (Tool handles this automatically for files <= 6 bytes).
3.  **Medium-Cost (Logic/OSINT):** What does the user know? Can we build a highly targeted mask or a custom situational dictionary based on the target's background?
4.  **High-Cost (Brute-force):** Fallback to massive standard dictionaries.

## ⚙️ The Execution Pipeline

**CRITICAL:** ALWAYS append the `-q` (Quiet/Agent Mode) flag to all `ZipCracker.py` executions to maintain clean terminal context and prevent interactive blockers.

### Phase 1: The Tactical Reconnaissance & Quick Strike
When a user asks to unlock, crack, or decrypt a `.zip` file, immediately run the default strike:
`python3 ZipCracker.py <filepath> -q`

**What happens under the hood:**
- The script automatically neutralizes pseudo-encryption.
- It automatically exploits CRC32 collisions for small files.
- It runs through standard built-in dictionaries and 1-6 digit numbers.
- It auto-resolves AES dependency issues by installing `pyzipper` if needed.

### Phase 2: Agentic Autonomy (Advanced Attacks)
If Phase 1 fails (the script completes but no password is found), DO NOT give up and DO NOT guess randomly. You must switch to an active offensive stance. Ask the user for OSINT (Open Source Intelligence) clues by replying with something like:
> *"The standard dictionary and numeric brute-force attempts did not find the password. To initiate an advanced attack, please provide any contextual clues you might have about the target: e.g., names, birth years, company acronyms, pet names, or specific password habits (like requiring an uppercase letter and a symbol)."*

Based on the user's response, **YOU** must autonomously choose the best advanced attack strategy:

#### Strategy A: The Sniper Strike (Mask Attack)
If the user provides a definitive structural pattern (e.g., "It starts with Hx0, followed by a symbol, then 4 numbers").
- **Construct the Mask:** `Hx0?s?d?d?d?d`
- **Execute:** `python3 ZipCracker.py <filepath> -m 'Hx0?s?d?d?d?d' -q`
- *(Reference rules: `?d`=digits, `?l`=lowercase, `?u`=uppercase, `?s`=symbols, `??`=literal '?')*

#### Strategy B: The Social Engineering Dictionary (Dynamic Generation)
If the user provides scattered background information (e.g., "Target's name is kaka, born in 1995, works at tencent"), a mask is too broad. You must dynamically generate a custom dictionary.
1. **Act as a Developer:** Write and execute a quick Python script in your workspace to generate logical permutations of these keywords (e.g., `kaka1995`, `Tencent@kaka!`, `1995kaka`).
2. **Save the Output:** Save these permutations to a file named `target_intel_dict.txt`.
3. **Execute the Custom Attack:** `python3 ZipCracker.py <filepath> target_intel_dict.txt -q`

## 📊 Result Parsing & Reporting
- If the tool outputs `[+] Success! The password is: <password>`, boldly and clearly present the recovered password to the user.
- If it outputs CRC32 cracked content, present the exact inner file content directly to the user.
- If it outputs `Pseudo-encryption fixed successfully`, inform the user that a new, unencrypted version of the archive is ready in the `unzipped_files` directory.
- If an AES error occurs that bypasses the auto-installer, explicitly instruct the user to check their Python environment permissions or run `pip3 install pyzipper` manually.