This is a brute force password cracker for databases (currently Oracle 11g amd Microsoft SQL Server). I intended to create a password cracker which uses CUDA framework for NVIDIA GPUs to speed up computations. It implements session handling to pause and continue cracking, it processes multiple passwords simultaneously. The source code is written in a way to support arbitrary character sets and is published under GPLv3.

Download executable:

Download source code:

Usage information:

Author: Marcell Major
Author's e-mail ( marcell.major


cudadbcracker is a salted SHA-1 cracker for cracking database password hashes
using CUDA enabled videocards. cudadbcracker was developed using NVIDIA CUDA
Software Development Kit (CUDA SDK) Version 2.1. cudadbcracker is free software
under GNU GENERAL PUBLIC LICENSE Version 3, see license.txt. cudadbcracker
currently supports MSSQL and Oracle 11g hashes.

-cracking multiple password hashes (max. 999)
-session handling (cracking can be interrupted and continued later)
-logging cracked password
-optional character set selection

Quick start

Show command line options:

Show available GPUs:
cudadbcracker.exe -v

Crack MSSQL hashes:
cudadbcracker.exe -h mssql -c un -i mssqltest.hashes

Cracking Oracle 11g hashes:
cudadbcracker.exe -h ora11g -c uln -k 2 -n 2 -i ora11gtest.hashes

Continuing a saved session:
cudadbcracker.exe -l

Running tests:
Start mssql_test.cmd or ora11g_test.cmd.


cudadbcracker.exe            - main executable
cudart.dll                   - CUDA runtime (part of CUDA toolkit)
cutil32.dll                  - CUDA utils (part of CUDA SDK)
libeay32.dll                 - OpenSSL support
license.txt                  - GNU GENERAL PUBLIC LICENSE Version 3
mssql_test.cmd               - test command for MSSQL tests
mssql_testcase.txt           - test hashes for MSSQL tests
mssql_testcase_pass.txt      - test passwords for MSSQL tests
ora11g_test.cmd              - test command for Oracle 11g tests
orasha_testcase.txt          - test hashes for Oracle 11g tests
orasha_testcase_pass.txt     - test passwords for Oracle 11g tests

Command line options
cudadbcracker.exe -h <hashtype> -i <inputfile> -s <sessionfile>
 -l <loadsession> -r <record> -c <charset> -n <numstreams>
 -k <kernels> -v -d <device>

 * -h, --hashtype=<hashtype>        Type of hashes to load (mssql,ora11g).
 * -i, --inputfile=<inputfile>      Name of input file.
   -s, --sessionfile=<sessionfile>  Name of session file. Default is
   -l, --loadsession=<loadsession>  Name of session file to load.
   -r, --record=<record>            Name of record file. Default is
   -c, --charset=<charset>          Character set used for cracking (can be any
                                    combination of 'u'pper, 'l'ower,'n'umeric
                                    and 's'pecial). Default is "un".
   -n, --numstreams=<numstreams>    Number of streams. Default value:1
   -k, --kernels=<kernels>          Number of kernels per streams. Default
   -v, --view                       View GPU information about CUDA enabled
   -d, --device=<device>            Selected CUDA device index. If not given,
                                    the default is auto select.

 * = required parameter

When loading from session file, all other parameters can be skipped.