The program uses a SQL-like language and a following set of switches to decrypt and launch attacks:
- Start: Starts the application.
- Next: Continue decrypting the given file or folder.
- Directory: Returns you the decrypted passwords in a specific directory.
- Exclude: Returns you the decrypted passwords and files that are contained in an excluded folder.
- Item: Returns you the decrypted passwords in a specified item.
- Password: Returns the dec 66cf4387b8 laurran