# zipC

<https://github.com/kavin-jindal/zipC>

This is a simple tool that I wrote in Python 3 to brute-force ZIP file passwords. I built this project a while ago to get some scripting experience in the language.

You can brute-force passwords of locked ZIP archives by providing a wordlist. The program will crack the password and extract the contents of the given file in the directory specified.

<figure><img src="https://697415701-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGOxHHc65JQOToz8nkPKh%2Fuploads%2Fqx52dqbPIX5Cy8RTbk63%2FScreenshot%202025-08-27%20135626.png?alt=media&#x26;token=8e49f99b-0337-4045-b13d-65669c4b6e9a" alt=""><figcaption></figcaption></figure>

## Installation

```
git clone https://github.com/kavin-jindal/zipC.git
pip install colorama
```

## Usage

```
Usage: 
    python zipc.py -f <zipfile> -w <wordlist> -p <output_path>

Required arguments:
    -f, --file [path]       Path to the target zip file
    -w, --wordlist [path]   Path to the wordlist to be used
Optional arguments:
    -o, --output [path]     Directory to extract the file in
    -h, --help              Shows the help menu

Examples: 
    python zipc.py -f main.zip -w rockyou.txt 
    python zipc.py -f main.zip -w rockyou.txt -o /home/Desktop/main
    python zipc.py --file /home/john/Desktop/archive.zip -w rockyou.txt -o /home/Documents/archive
```

## Examples:

### Example 1

```
python zipc.py -w rockyou.txt -f main.zip
```

<figure><img src="https://697415701-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGOxHHc65JQOToz8nkPKh%2Fuploads%2Fo4iadqezAETZ7JIdGhPU%2FScreenshot%202025-08-27%20135157.png?alt=media&#x26;token=8a8fd77c-5477-46f2-b220-bfb7bbdf2c53" alt=""><figcaption></figcaption></figure>

### Example 2

```
python zipc.py -w rockyou.ltxt -f main.zip -o /main/test
```

<figure><img src="https://697415701-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGOxHHc65JQOToz8nkPKh%2Fuploads%2FUCcSNsyvqOF49jOtgY0T%2FScreenshot%202025-08-27%20135829.png?alt=media&#x26;token=3ba579c9-9eaa-41f2-83f6-bf942d2a6b62" alt=""><figcaption></figcaption></figure>
