If you suspect it belongs to a package, then use your distribution's package manager to find which package owns it. (Subdirectories in 'sbin' are odd, but I've seen packages do weirder stuff.)
For example, dpkg -S weakpass on Debian, or pacman -Qo /usr/sbin/authserver/weakpass on Arch.
If you find nothing, then try Debian Code Search for any mentions of some text:
That finds nothing, so GitHub next:
That also finds nothing, so the next thing to try is strings to find any mentions of the product or package embedded within the binary itself:
strings -n 15 /usr/sbin/authserver/weakpass
If that also finds nothing, search the rest of the system for 'weakpass'. Maybe even:
grep -r weakpass /etc /usr /opt
It just hangs when I fill in the arguments correctly.
I am pretty sure it does not hang, but rather waits for you to provide input – the password. Similar to how cat or tail behave when you run them without any file argument. Try entering something, then pressing Ctrl-D twice (or the Enter key once and Ctrl-D once).
(That is, it looks like a close equivalent of 'cracklib' or 'pwquality'.)
In general this looks like a binary meant for 'batch' use, i.e. not for running directly in a terminal but rather invoked from another program (maybe from a PAM module). Depending on its verdict, it probably exits with status code 0 (good password) or 1 (weak password).
Such binaries don't bother showing interactive prompts like "Enter password:" as the calling program would then need to specifically suppress or ignore it somehow, and that's just extra work if the program isn't meant to be run by users anyway.
(Though normally such tools would go in /usr/lib, not /usr/sbin.)
why they're so hidden... why do you say that the files are hidden?weakpass --helpreturn anything useful? ... do NOT run with elevated privileges