Search the Community

Showing results for tags 'hash'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 24 results

  1. Hash Expand will sort your bases! - Multifunctional - Simple interface - Fast processing speed [hide][Hidden Content]]
  2. The following is a PHP script for running dictionary attacks against both salted and unsalted password hashes. It is capable of attacking every hash function supported by PHP's hash function, as well as md5(md5), LM, NTLM, MySQL 4.1, and crypt hashes. It also supports crashed session recovery. [HIDE][Hidden Content]]
  3. itsMe

    Hash Cracker

    OLD Source [HIDE][Hidden Content]]
  4. [HIDE][Hidden Content]]
  5. A Simple , Fast and Multi Threaded Bruteforce attack tool for MD5 SHA1 SHA256 SHA384 SHA512 [HIDE][Hidden Content]]
  6. [HIDE][Hidden Content]]
  7. itsMe

    Hash Sorter ByGuron

    Sort your hashes by file. Work with large files. Minimum interface. Mini stats. Minimum weight of the program. Now you can add your hashe types to the costom.ini file, there's an example of how to do it ({TAB} divider) Accepts -anything you want:hash -anything you want:hash:salt -hash Hashes formats MD5 SHA1 SHA-256 SHA-512 Base64 osCommerce MD5:salt MYSQL3 SHA1:salt MYSQL5 SHA-224 SHA-256:salt SHA-512:salt MD5(APR) phpBB3 WordPress(MD5) MD5(Unix) Blowfish(Unix) Drupal7 [HIDE][Hidden Content]]
  8. Python hash cracker Supported hashing algorithms: SHA512, SHA256, SHA384, SHA1, MD5, SHA224 Features: auto detection of hashing algorithm based on length (not recommended), bruteforce, password list Arguments: type: hash algorithm (must be one of the supported hashing algorithms mentioned above or AUTO if you want to use automatic algorithm detection) hash: can be either the hashed password, or a text file containing a list of hashes to crack (hashlist must be activated if hash is a text file containing multiple hashes) mode: list or bruteforce pwlist: list of passwords to compare against a single hash or a list of hashes range: bruteforce string length range (default: 8-11) hashlist: no parameters required for this argument, if hashlist is used, then hash should be a text file with more than 1 hash chars: string of characters to pick from to generate random strings for bruteforce (default value is: abcdefghijklmnopqrstuvwxyzABCDEFGHJIKLMNOPQRSTUVWXYZ0123456789) Hash Cracker 1.2 (Better bruteforce) -chars argument and -range argument for bruteforce mode. [HIDE][Hidden Content]]
  9. itsMe

    MD5 Hash Decoder [v2.0]

    [HIDE][Hidden Content]]
  10. Description This tool uses a new method to crack hashes. With the help of rainbow tables concept this tool generates rainbow tables from wordlists to heavily optimize the cracking process. Supported Hashing Algorithms blake2b-160 blake2b-256 blake2b-384 blake2b-512 blake2s-128 blake2s-160 blake2s-224 blake2s-256 md2 md4 md5 sha1 sha224 sha256 sha384 sha512 sha3-224 sha3-256 sha3-384 sha3-512 keccak-224 keccak-256 keccak-384 keccak-512 ripemd-128 ripemd-160 ripemd-256 ripemd-320 whirlpool tiger Supported Compression Algorithms zstd snappy zlib bzip2 lz4 lz4hc [HIDE][Hidden Content]]
  11. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  12. Bum-rush is a multi-threaded hash cracker. It was written on node.js / electron and can be compiled for any OS. Cracking Methods: - Bruteforce - Combinator - Dictionary - Hybrid Hash Types: - MD5 - bcrypt Settings: - BackgroundThrottling: if enabled, forces the app to share resources (if the app loses focus, it slows down); - HardwareAcceleration; Thread Recommendations (MD5): - 1 Core, 2GB Ram: 50 Threads - 2 Cores, 4GB Ram: 100 Threads - 4 Cores, 8GB Ram: 200 Threads - 8 Cores, 16Gb Ram: 400 Threads Thread Recommendations (Bcrypt): - 1 Core, 2GB Ram: 1 Thread - 2 Cores, 4GB Ram: 2 Threads - 4 Cores, 8GB Ram: 3 Threads - 8 Cores, 16GB Ram: 6 Threads Speed (1 Thread): - Bcrypt: 2 CPS - MD5: 600 CPS Notices: - Threadlist / wordlist length can be greater than 7 digits; the max length is determined by the available ram - When loading large hashlists, only 100 hashes are displayed on the options page to prevent UI lag. Known Issues: - If thread count exceeds wordlist length, some threads will fail to start - Bcrypt is extremely slow and requires a lot resources - If options are not set, the cracker will fail to start; no prompt is shown - CPM slows down a single thread and may be inaccurate; faster than shown; this inaccuracy becomes greater with more threads [Hidden Content]
  13. [HIDE][Hidden Content]]
  14. Version: 1.0.0.0 Threads: 1-5 Proxies: No Hashes: MD5 & SHA1 ( Coming Soon ) Auto-Save: Yes, click the stop button or close the tool once u finished and it will auto save all hits! Auto-Updater: Yes, u will get notified once the newer version is available CPM: 700~ [HIDE][Hidden Content]]
  15. $ python3 hashboy.py __ __ __ / /_ ____ ______/ /_ / /_ ____ __ __ / __ \/ __ `/ ___/ __ \/ __ \/ __ \/ / / / / / / / /_/ (__ ) / / / /_/ / /_/ / /_/ / /_/ /_/\__,_/____/_/ /_/_.___/\____/\__, / /____/ Author:Leiothrix Github:[Hidden Content] usage: hashboy.py [-h] [-s HASH] [-f FILE] [-t THREADS] optional arguments: -h, --help show this help message and exit -s HASH, --hash HASH hash -f FILE, --file FILE file containing hashes -t THREADS, --threads THREADS number of threads [Hidden Content]
  16. itsMe

    Hash - - Cracker

    Hash - - Cracker This tool applies a brute force method against various types of hashes to try and crack them. Currently, the supported hashes are: MD5 MD4 LM NTLM SHA1 SHA224 SHA256 SHA384 SHA512 Download: [HIDE][Hidden Content]] It tries to be more efficient by parallelizing the work performed on different character sets. For example, if the character set abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ is selected then one worker will work with abcdefghijklmnopqrstuvwxyz, another worker will work with ABCDEFGHIJKLMNOPQRSTUVWXYZ, and the last worker will work with abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ. Requirements Python 3 Performance While this tool does what it's supposed to, it has some major downfalls. For starters, it's using Python. I'm not saying Python is a bad language or anything like that. The issue is Python's GIL which prevents multiple threads from executing Python's bytecode at the same time. This means that I am unable to achieve parallelism with threads since only one character set would be worked on at a time. What needs to be done instead is splitting the work up across multiple processes and share data across those processes. This is less efficient than working with threads in general but is a necessary evil with Python. Recommendations Due to the performance explanations above I would not recommend using Python for these kinds of tools. You could consider this project an example of how to accomplish such a task using Python and an example of what kinds of issues you'd run into. Sure, the tool is certainly usable and works as it should, but if you are serious about building these kinds of tools I would look at using C, C++, Rust, or Go. Actually, I take that back. If you want an industry-competitive tool don't bother targeting the CPU. Instead use C/C++ that will run on GPUs and utilize CUDA, OpenCL, or ACL.
  17. [HIDE][Hidden Content]]
  18. Hash Generator & Cracker Online Offline suported hash: md5 sha1 sha224 sha256 sha384 sha512 [HIDE][Hidden Content]]
  19. Salted Hash Kracker is the free all-in-one tool to recover the Password from Salted Hash text. [HIDE][Hidden Content]] Currently it supports password recovery from following popular Hash types MD5 SHA1 SHA256 SHA384 SHA512 SaltedHashKracker See Also Hash Kracker : All-in-one Hash Password Recovery Tool Hash Kracker Console: Command-line Tool to find Password for all popular Hashes Windows Password Kracker : Free Windows Password Recovery Software Hash Compare : Free File Hash Comparison Tool Hash Generator: Universal Hash Generator Tool Contents About Features Installation & Un-installation How to use? Screenshots Release History Download New v4.0 About Salted Hash Kracker is the free all-in-one tool to recover the Password from Salted Hash text. These days most websites and applications use salt based hash generation to prevent it from being cracked easily using precomputed hash tables such as Rainbow Crack. In such cases, 'Salted Hash Kracker' will help you to recover the lost password from salted hash text. It also allow you to specify the salt position either in the beginning of password(salt+password) or at the end of the password (password+salt). In case you want to perform normal hash cracking without the salt then just leave the 'Salt field' blank. Features Free and easy to use GUI based tool Supports popular hash types such as MD5, SHA1, SHA256, SHA384, SHA512. Automatically detects the Hash Type Displays detailed statistics during Cracking operation Stop the hash password cracking operation any time. Auto copy the recovered hash password to clipboard on success Generate report in HTML/XML/TEXT format. Fully Portable tool, can run from anywhere. Includes Installer for local Installation & Uninstallation. How to use?
  20. itsMe

    Hash Buster 3.0

    Features Automatic hash type identification Supports MD5, SHA1, SHA256, SHA384, SHA512 Can extract & crack hashes from a file Can find hashes from a directory, recursively Multi-threading [HIDE][Hidden Content]]
  21. Software para identificar los diferentes tipos de hashes utilizados para encriptar datos y especialmente contraseñas. Formatos de cifrado compatibles: ADLER-32 CRC-32 CRC-32B CRC-16 CRC-16-CCITT DES (Unix) FCS-16 GHash-32-3 GHash-32-5 GOST R 34.11-94 Haval-160 Haval-192 110080, Haval-224 114080, Haval-256 Lineage II C4 Credenciales en caché de dominio XOR-32 MD5 (Mitad) MD5 (Medio) MySQL MD5 (phpBB3) MD5 (Unix) MD5 (Wordpress) MD5 (APR) Haval-128 MD2 MD4 MD5 MD5 (HMAC (Wordpress)) NTLM RAdmin v2.x RipeMD-128 SNEFRU-128 Tiger-128 MySQL5 - SHA-1 (SHA-1 ($ pase)) MySQL 160bit - SHA-1 (SHA-1 ($ pase)) RipeMD-160 SHA-1 SHA-1 (MaNGOS) Tiger-160 Tiger-192 md5 ($ pass. $ salt) - Joomla SHA-1 (Django) SHA-224 RipeMD-256 SNEFRU-256 md5 ($ pass. $ salt) - Joomla SAM - (LM_hash: NT_hash) SHA-256 (Django) RipeMD-320 SHA-384 SHA-256 SHA-384 (Django) SHA-512 Torbellino Y más… Algoritmos de cifrado que no se pueden diferenciar a menos que se hayan descifrado, por lo que la eficacia del software también depende de los criterios del usuario. Download: Hash ID v1.1
  22. dEEpEst

    CrackStation

    How CrackStation Works CrackStation uses massive pre-computed lookup tables to crack password hashes. These tables store a mapping between the hash of a password, and the correct password for that hash. The hash values are indexed so that it is possible to quickly search the database for a given hash. If the hash is present in the database, the password can be recovered in a fraction of a second. This only works for "unsalted" hashes. For information on password hashing systems that are not vulnerable to pre-computed lookup tables, see our hashing security page. Crackstation's lookup tables were created by extracting every word from the Wikipedia databases and adding with every password list we could find. We also applied intelligent word mangling (brute force hybrid) to our wordlists to make them much more effective. For MD5 and SHA1 hashes, we have a 190GB, 15-billion-entry lookup table, and for other hashes, we have a 19GB 1.5-billion-entry lookup table. Source: [Hidden Content]