Extractify.zip is open source progressive web app (PWA) website to view and extract zip files online without downloading them (client side). Drag and drop your zip file to the page. Sandbox mode to prevent malicious files. Uses WebAssembly to extract files, no server side code. Works on mobile and desktop. View and Extract compressed files. Don't need to upload your files to server. Works offline.
A .zip file which, when uncompressed, is a perfect copy of itself.
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
A ZIP archive may contain many entries whose content can be compressed and/or encrypted. In particular, entries can be encrypted with a password-based symmetric encryption algorithm referred to as traditional PKWARE encryption, legacy encryption or ZipCrypto. This algorithm generates a pseudo-random stream of bytes (keystream) which is XORed to the entry's content (plaintext) to produce encrypted data (ciphertext). The generator's state, made of three 32-bits integers, is initialized using the password and then continuously updated with plaintext as encryption goes on. This encryption algorithm is vulnerable to known plaintext attacks as shown by Eli Biham and Paul C. Kocher in the research paper A known plaintext attack on the PKZIP stream cipher. Given ciphertext and 12 or more bytes of the corresponding plaintext, the internal state of the keystream generator can be recovered. This internal state is enough to decipher ciphertext entirely as well as other entries which were encrypted with the same password. It can also be used to bruteforce the password with a complexity of nl-6 where n is the size of the character set and l is the length of the password.
Utilities for cracking encrypted zip files that use weak encryption. CUDA enabled.
An open source utility that will crack the password used to encrypt .rar, .zip, and .7z archives. Runs multi-threaded to speed things up because it uses a brute-force attack.