GoldenEye (GoldEye) Password Cracker – Download or

Outsmart Malicious Hackers

GoldenEye is a brute-force hacking program and was written for web-masters to test the security of their own sites. This is an oldskool file, a lot of people are still looking for this.

It should not be use by others to hack sites – this would be illegal! Under no circumstances should the author or any other persons involved in its development or distribution be held liable for the misuse of the program.

Once again these old files and tutorials are meant for the purpose of learning, test them in your own lab, see how they work, see what they do then try and write something similar yourself.


GoldenEye works with different types of wordlists:

GoldenEye executes its attempts simultaneously. The number of simultaneous attempts can be adjusted with the speed slider on the “access” tab. You can also adjust the speed limit. On the Options|Connections tab you’ll find a box to set the “top-speed”; select an apropiate value. Use lower values for slow internet connection!

If you get to much timed-out connections, lower the crack speed or increase the TTL (time to life). Timed-out connections will be automatically resumed if you check ‘Resume time-out connections automatically’ on the same tab.

Note: The program is tested with 70 simultaneous request. If you choose a higher value, do it on your own risk! If GoldenEye tells you something about buffer problems, lower the speed next time. I’ve encountered that other running programs may cause buffer problems.

GoldenEye logs the cracked sites. They are listed on the History|Access History tab. You can select and delete single entries or the whole list. Expired combinations will be automatically removed when you click the check for expired passwords button. Click on the ‘visit button’ or double click on the selected url to launch it in your browser.

Access tab

The url box: if you don’t remember the members url you can

  • search through the list
  • or you type in a part off the url or a defined site name (see History|URL History) and click on the small button at the right end of the url-box.

Options|Advanced tab:

  • Change proxy after x attempts: GoldenEye changes the proxy automatically after x attempts if this options is checked.You have to use several proxies to use this feature. Add proxies on the Options|connections tab.GoldenEye changes the proxy randomly or in the order which is given by the proxy-list.
  • Server Response: the standard values are ‘200’ for ok and ‘401’ for access denied (unauthorized). If the server you’re attacking gives other reply numbers you can change them. Note: You can’t use 404 or 500!
  • Cookie: If the attacked server needs a cookie, check this option and enter the cookie string.
  • Referer: If the attacked server needs the url of the refering site, enter it here.

Wordlist tools tab

  • Remove dupes: New: If you’re using single lists for userID and password GoldenEye removes the dupes simultaneous.
  • General wordlist options:
    • Define a mininum and maximum length for the userID and password (standard settings 1-32)
    • Convert the list: All passes will be converted ‘on-the-fly’.
    • Wordlist style: If you want to use single lists: check this option.
  • Wordlist manipulations: this tab appears after you’ve loaded a list and checked the ‘Extend list’ on “General wordlist”
    “Common manipulations” are predefined manipulations.
    On the “Advanced” tab you can choose your own prefixes, suffixes, etc. If you miss something, tell me!

Security check

  • Server security test: It tests the attacked server for other security holes.
  • Proxy test: tests the proxy-speed. The values are in milliseconds.

Your anti-virus software may find a Win32.Gen.Trojan or similar in this file, that’s normal for most hacking software. Darknet in no way implies that this software is safe and free of malware, use at your own risk.

You can download GoldenEye 1.0 here.

To avoid any network issues the zip file is passworded, the password is darknet123.

Posted in: Hacking Tools, Password Cracking, Web Hacking

, ,

Latest Posts:

OWASP ZSC - Obfuscated Code Generator Tool OWASP ZSC – Obfuscated Code Generator Tool
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert scripts to an obfuscated script.
A Look Back At 2017 – Tools & News Highlights A Look Back At 2017 – Tools & News Highlights
So here we are in 2018, taking a look back at 2017, quite a year it was. Here is a quick rundown of some of the best hacking/security tools released in 2017, the biggest news stories and the 10 most viewed posts on Darknet as a bonus.
Spectre & Meltdown Checker - Vulnerability Mitigation Tool For Linux Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
Hijacker - Reaver For Android Wifi Hacker App Hijacker – Reaver For Android Wifi Hacker App
Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful Wifi hacker app.
Sublist3r - Fast Python Subdomain Enumeration Tool Sublist3r – Fast Python Subdomain Enumeration Tool
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.
coWPAtty Download - Audit Pre-shared WPA Keys coWPAtty Download – Audit Pre-shared WPA Keys
coWPAtty is a C-based tool for running a brute-force dictionary attack against WPA-PSK and audit pre-shared WPA keys.

15 Responses to GoldenEye (GoldEye) Password Cracker – Download or

  1. .mario December 30, 2006 at 12:13 am #

    Hmmm, AntiVir says BDS/Delf.JM – what say you?

  2. .mario December 30, 2006 at 12:14 am #

    ah sorry – didn’t finish reading. nevermind ;)

  3. Marko_Catone January 10, 2007 at 5:11 pm #

    It says I need a password for the encrypted file, (Goldeneye.rtf) How do I get one?

  4. pzepf January 20, 2007 at 2:29 am #

    how do i install this exactly. it keeps giving me errors on it. can you specify it. I install it and then try to move it to the folder i have and it keeps telling me that it will not run.

  5. Stephene January 21, 2007 at 12:22 am #

    how do u open it, i cant find it what buttons do u press

  6. ollied January 21, 2007 at 5:23 am #

    Sure i will hack to learn via doi, just wanna get fulltext journal thats all, Oh…sciencedirect never mind!!

  7. Jack of trades January 26, 2007 at 6:44 pm #

    Can’t get it to work, when I try to run it nothing happens. Any help please?

  8. web master February 11, 2007 at 2:01 am #

    every time i run goldeneye.exe it says that windows does not hav appropriate permission to open the file???see a problem?

  9. god March 4, 2007 at 3:42 am #

    you have to be an idiot to download this its a trojan virus that will f up your pc

  10. Cobra May 2, 2007 at 10:24 am #

    Very handy for my project on security systems…

  11. yourname July 15, 2008 at 9:38 pm #

    How do I install this in ubuntu? When I try to run through WINE it get a
    application error.

    Exception TICMPException in module GoldenEye.exe at 00092B92. Unable to get ping handle.

  12. abdulla toghouj October 12, 2008 at 12:39 pm #

    thats actually great to learn.

  13. unknown283 January 27, 2009 at 5:07 pm #

    where do you get a wordlist??????????

  14. Bogwitch January 27, 2009 at 7:22 pm #

    Wordlists available here