Jump to content

Welcome to LeVeL23HackTools

Welcome to LeVeL23HackTools, like most online communities you must register to view or post in our community, but don't worry this is a simple free process that requires minimal information for you to signup. Be apart of LeVeL23HackTools by signing in or creating an account.

  • Start new topics and reply to others
  • Subscribe to topics and forums to get email updates
  • Get your own profile page and make new friends
  • Send personal messages to other members.

Sign in to follow this  
dEEpEst

hash Hash ID v1.1​​​​​​​ hash-identifier

Recommended Posts

Software para identificar los diferentes tipos de hashes utilizados para encriptar datos y especialmente contraseñas.

Formatos de cifrado compatibles:

ADLER-32

CRC-32

CRC-32B

CRC-16

CRC-16-CCITT

DES (Unix)

FCS-16

GHash-32-3

GHash-32-5

GOST R 34.11-94

Haval-160

Haval-192 110080, Haval-224 114080, Haval-256

Lineage II C4

Credenciales en caché de dominio

XOR-32

MD5 (Mitad)

MD5 (Medio)

MySQL

MD5 (phpBB3)

MD5 (Unix)

MD5 (Wordpress)

MD5 (APR)

Haval-128

MD2

MD4

MD5

MD5 (HMAC (Wordpress))

NTLM

RAdmin v2.x

RipeMD-128

SNEFRU-128

Tiger-128

MySQL5 - SHA-1 (SHA-1 ($ pase))

MySQL 160bit - SHA-1 (SHA-1 ($ pase))

RipeMD-160

SHA-1

SHA-1 (MaNGOS)

Tiger-160

Tiger-192

md5 ($ pass. $ salt) - Joomla

SHA-1 (Django)

SHA-224

RipeMD-256

SNEFRU-256

md5 ($ pass. $ salt) - Joomla

SAM - (LM_hash: NT_hash)

SHA-256 (Django)

RipeMD-320

SHA-384

SHA-256

SHA-384 (Django)

SHA-512

Torbellino

Y más…

Algoritmos de cifrado que no se pueden diferenciar a menos que se hayan descifrado, por lo que la eficacia del software también depende de los criterios del usuario.

 

Download:

Hidden Content

    Give reaction to this post to see the hidden content.

  • Like 7

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.
Sign in to follow this  

  • Similar Content

    • By sQuoII

      Hidden Content
      Give reaction to this post to see the hidden content.
      Hidden Content
      Give reaction to this post to see the hidden content.
      Hidden Content
      Give reaction to this post to see the hidden content.
    • By sQuoII

      Hidden Content
      Give reaction to this post to see the hidden content.
      Hidden Content
      Give reaction to this post to see the hidden content. Info:
      Hidden Content
      Give reaction to this post to see the hidden content.  
      Thousands of organizations use Burp Suite to find security exposures before it’s too late. By using cutting-edge scanning technology, you can identify the very latest vulnerabilities. Our researchers frequently uncover brand new vulnerability classes that Burp is the first to report.
      What is Burp Suite you ask? Burp Suite is a Java based Web Penetration Testing framework. It has become an industry standard suite of tools used by information security professionals. Burp Suite helps you identify vulnerabilities and verify attack vectors that are affecting web applications. Because of its popularity and breadth as well as depth of features, we have created this useful page as a collection of Burp Suite knowledge and information.
      In its simplest form, Burp Suite can be classified as an Interception Proxy.
      While browsing their target application, a penetration tester can configure their internet browser to route traffic through the Burp Suite proxy server.
      Burp Suite then acts as a (sort of) Man In The Middle by capturing and analyzing each request to and from the target web application so that they can be analyzed. Penetration testers can pause, manipulate and replay individual HTTP requests in order to analyze potential parameters or injection points.
      Injection points can be specified for manual as well as automated fuzzing attacks to discover potentially unintended application behaviors, crashes and error messages.
      Please use Java 8 because from version 9 and up xbootclasspath argument has been disabled.
      Works only with Java 8.

      Hidden Content
      Give reaction to this post to see the hidden content. Pass:
       
      Hidden Content
      Give reaction to this post to see the hidden content.  
    • By sQuoII

      Hidden Content
      Give reaction to this post to see the hidden content.  
      fsociety Hacking Tools Pack – A Penetration Testing Framework

      Menu
          Information Gathering
          Password Attacks
          Wireless Testing
          Exploitation Tools
          Sniffing & Spoofing
          Web Hacking
          Private Web Hacking
          Post Exploitation
          Contributors
          Install & Update
      Information Gathering:
          Nmap
          Setoolkit
          Host To IP
          WPScan
          CMS Scanner
          XSStrike
          Dork - Google Dorks Passive Vulnerability Auditor
          Scan A server's Users
          Crips
      Password Attacks:
          Cupp
          Ncrack
      Wireless Testing:
          Reaver
          Pixiewps
          Bluetooth Honeypot
      Exploitation Tools:
          ATSCAN
          sqlmap
          Shellnoob
          Commix
          FTP Auto Bypass
          JBoss Autopwn
      Sniffing & Spoofing:
          Setoolkit
          SSLtrip
          pyPISHER
          SMTP Mailer
      Web Hacking:
          Drupal Hacking
          Inurlbr
          Wordpress & Joomla Scanner
          Gravity Form Scanner
          File Upload Checker
          Wordpress Exploit Scanner
          Wordpress Plugins Scanner
          Shell and Directory Finder
          Joomla! 1.5 - 3.4.5 remote code execution
          Vbulletin 5.X remote code execution
          BruteX - Automatically brute force all services running on a target
          Arachni - Web Application Security Scanner Framework
      Private Web Hacking:
          Get all websites
          Get joomla websites
          Get wordpress websites
          Control Panel Finder
          Zip Files Finder
          Upload File Finder
          Get server users
          SQli Scanner
          Ports Scan (range of ports)
          Ports Scan (common ports)
          Get server Info
          Bypass Cloudflare

      Hidden Content
      Give reaction to this post to see the hidden content.
    • By sQuoII

      Hidden Content
      Give reaction to this post to see the hidden content. Hash Generator & Cracker Online Offline suported hash:
          md5
          sha1
          sha224
          sha256
          sha384
          sha512


      Hidden Content
      Give reaction to this post to see the hidden content.
      Hidden Content
      Give reaction to this post to see the hidden content.  
    • By sQuoII

      Hidden Content
      Give reaction to this post to see the hidden content. Salted Hash Kracker is the free all-in-one tool to recover the Password from Salted Hash text.

      Hidden Content
      Give reaction to this post to see the hidden content. Currently it supports password recovery from following popular Hash types
          MD5     SHA1     SHA256     SHA384     SHA512
      SaltedHashKracker
      See Also
      Hash Kracker : All-in-one Hash Password Recovery Tool
      Hash Kracker Console: Command-line Tool to find Password for all popular Hashes
      Windows Password Kracker : Free Windows Password Recovery Software
      Hash Compare : Free File Hash Comparison Tool
      Hash Generator: Universal Hash Generator Tool
      Contents
          About     Features     Installation & Un-installation       How to use?       Screenshots     Release History     Download   New v4.0  
      About   
      Salted Hash Kracker is the free all-in-one tool to recover the Password from Salted Hash text.
      These days most websites and applications use salt based hash generation to prevent it from being cracked easily using precomputed hash tables such as Rainbow Crack. In such cases, 'Salted Hash Kracker' will help you to recover the lost password from salted hash text.
      It also allow you to specify the salt position either in the beginning of password(salt+password) or at the end of the password (password+salt). In case you want to perform normal hash cracking without the salt then just leave the 'Salt field' blank.
      Features
       
       
          Free and easy to use GUI based tool
          Supports popular hash types such as MD5, SHA1, SHA256, SHA384, SHA512.
          Automatically detects the Hash Type
          Displays detailed statistics during Cracking operation
          Stop the hash password cracking operation any time.
          Auto copy the recovered hash password to clipboard on success
          Generate report in HTML/XML/TEXT format.
          Fully Portable tool, can run from anywhere.
          Includes Installer for local Installation & Uninstallation.
       
      How to use?
       
       
×

Important Information

Terms of Service