Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Hash ID v1.1​​​​​​​ hash-identifier

      Recommended Posts

      Staff

      Software para identificar los diferentes tipos de hashes utilizados para encriptar datos y especialmente contraseñas.

      Formatos de cifrado compatibles:

      ADLER-32

      CRC-32

      CRC-32B

      CRC-16

      CRC-16-CCITT

      DES (Unix)

      FCS-16

      GHash-32-3

      GHash-32-5

      GOST R 34.11-94

      Haval-160

      Haval-192 110080, Haval-224 114080, Haval-256

      Lineage II C4

      Credenciales en caché de dominio

      XOR-32

      MD5 (Mitad)

      MD5 (Medio)

      MySQL

      MD5 (phpBB3)

      MD5 (Unix)

      MD5 (Wordpress)

      MD5 (APR)

      Haval-128

      MD2

      MD4

      MD5

      MD5 (HMAC (Wordpress))

      NTLM

      RAdmin v2.x

      RipeMD-128

      SNEFRU-128

      Tiger-128

      MySQL5 - SHA-1 (SHA-1 ($ pase))

      MySQL 160bit - SHA-1 (SHA-1 ($ pase))

      RipeMD-160

      SHA-1

      SHA-1 (MaNGOS)

      Tiger-160

      Tiger-192

      md5 ($ pass. $ salt) - Joomla

      SHA-1 (Django)

      SHA-224

      RipeMD-256

      SNEFRU-256

      md5 ($ pass. $ salt) - Joomla

      SAM - (LM_hash: NT_hash)

      SHA-256 (Django)

      RipeMD-320

      SHA-384

      SHA-256

      SHA-384 (Django)

      SHA-512

      Torbellino

      Y más…

      Algoritmos de cifrado que no se pueden diferenciar a menos que se hayan descifrado, por lo que la eficacia del software también depende de los criterios del usuario.

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Converts PE so that it can be then injected just like a normal shellcode.
          (At the same time, the output file remains to be a valid PE).
          Supports both 32 and 64-bit PEs
          Objective:
          The goal of this project is to provide a possibility to generate PE files that can be injected with minimal effort. It is inspired by Stephen Fewer’s ReflectiveDLLInjection – but the difference is that with pe2shc you can add the reflective loading stub post-compilation. Also, the header of the PE file is modified in such a way, that you can start executing the injected buffer from the very beginning – just like you would do with a shellcode. It will automatically find the stub and continue loading the full PE.
          Changelog v1.1
          BUGFIX
              Stub cleanup: do not clobber RBX/EBX registers
          REFACT
              Removed some useless instructions from 32 bit stub
              Small cleanup in the loader v2
          The package contains:
              pe2shc.exe – PE to shellcode converter (supports both 32 and 64 bit PEs)
              a utility to run/test shellcode (loads and deploys):
                  runshc32.exe – for 32-bit shellcodes
                  runshc64.exe – for 64-bit shellcodes
              a utility to inject shellcode into a given process:
                  injector32.exe – for 32-bit shellcodes
                  injector64.exe – for 64-bit shellcodes

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. aircrack-ng is an 802.11 WEP and WPA/WPA2-PSK key cracking program. It can recover the WEP key once enough encrypted packets have been captured with airodump-ng. This part of the aircrack-ng suite determines the WEP key using two fundamental methods. The first method is via the PTW approach (Pyshkin, Tews, Weinmann). The main advantage of the PTW approach is that very few data packets are required to crack the WEP key. The second method is the FMS/KoreK method. The FMS/KoreK method incorporates various statistical attacks to discover the WEP key and uses these in combination with brute force. Additionally, the program offers a dictionary method for determining the WEP key. For cracking
          WPA/WPA2 pre-shared keys, a wordlist (file or stdin) or an airolib-ng has to be used.
          Aircrack-ng version 1.7 releases.
          Changelog
              Airdecap-ng: Endianness fixes
              Airdecap-ng: Output PCAP as little endian
              Airodump-ng: Fixed blank encryption field when APs have TKIP (and/or CCMP) with WPA2
              Airodump-ng: Updated encryption filter (-t/–encrypt) for WPA3 and OWE
              Airodump-ng: Fixed out-of-order timestamp captures
              Airodump-ng: Ignore NULL PMKID
              Airodump-ng: Fixed dropping management frames with zeroed timestamp
              Airodump-ng: Fixed sorting where sometimes it started with a different field
              Airodump-ng: Allow setting colors only in AP selection mode
              Airodump-ng: Fix crash on 4K Linux console
              Airodump-ng: Fixed issue where existing clients not linked to an AP become hidden when hitting ‘o’
              Airodump-ng: Allow use of WiFi 6E 6GHz frequencies
              Airodump-ng: Look for oui.txt in /usr/share/hwdata
              Airgraph-ng: Fixed graphviz package conflict
              Airgraph-ng: Fixed downloading OUI with python3
              Airgraph-ng: Ensure support/ directory is created when installing
              Aircrack-ng: Fixed static compilation
              Aircrack-ng: Fix handshake replay counter logic
              Aircrack-ng: Handle timeout when parsing EAPOL
              Aircrack-ng: Fixed WEP display
              Aircrack-ng: Fixed spurious EXIT messages
              Aircrack-ng: Improved handshake selection by fixing EAPOL timing and clearing state
              Aircrack-ng: Ignore NULL PMKID
              Aircrack-ng: Added Apple M1 detection
              Aireplay-ng: In test mode, detect tampering of sequence number by firmware/driver
              Aireplay-ng: Fixed incorrectly rewritten loops affecting fragmentation attack, and in some cases, SKA fake auth
              Aireplay-ng: Fixed a bunch of instances where packets had their duration updated instead of the sequence number
              Airmon-ng: Fix avahi killing
              Airmon-ng: rewrite service stopping entirely
              Airmon-ng: Codestyle fixes and code cleanup
              Airmon-ng: Added a few Raspberry Pi hardware revisions
              Airmon-ng: Fixes for 8812au driver
              Airmon-ng: Fix iwlwifi firmware formatting
              Airmon-ng: Remove broken KVM detection
              Airmon-ng: Show regdomain in verbose mode
              Airmon-ng: Updated Raspberry Pi hardware revisions
              Airmon-ng: Document frequency usage
              Airmon-ng: Add a sleep to help predictable names due to udev sometimes renaming interface
              Airmon-ng: Added warning for broken radiotap headers in kernel 5.15 to 5.15.4
              Airmon-ng: shellcheck fixes
              Airmon-ng: support systemctl as some systems don’t support ‘service’ anymore
              Airmon-ng: Fixes for pciutils 3.8, backward compatible
              Airbase-ng: use enum for frame type/subtype
              Airbase-ng: remove a few IE in association responses
              Besside-ng: Support and detect all channels in 5GHz in Auto-Channel mode
              OSdep: Search additional IE for channel information
              OSdep: Android macro fixes
              Patches: Add missing patches that were on https://patches.aircrack-ng.org but not in repo
              Patches: Updated freeradius-wpe patch for v3.2.0
              Patches: Updated hostapd-wpe patch for v2.10
              Patches: Added docker containers to test WPE patches
              Autotools: make dist now creates VERSION file
              Autotools: Added maintainer mode
              Autotools: Initial support for Link Time Optimization (LTO) builds
              Integration tests: Added a new test, and improved some existing ones
              Airgraph-ng: switch airodump-join to Python 3
              Manpages: Fixes (typos, tools name, etc.) and improvements
              README: Updated dependencies and their installation on various distros in README.md and INSTALLING
              README: Fixed typos and spelling in README.md and INSTALLING
              Packages: Packages on PackageCloud now support any distro using .deb and .rpm, however, it requires reinstalling repo (BREAKING CHANGE)
              General: Fix compilation with LibreSSL 3.5
              General: Fix issues reported by Infer
              General: Updated buildbots
              General: Add Linux uclibc support
              General: Compilation fixes on macOS with the Apple M1 CPU
              General: Removed TravisCI and AppVeyor
              General: Use Github Actions for CI (Linux, Win, macOS, code style, and PVS-Studio)
              General: Added vscode devcontainer and documentation
              General: Fix warnings from PVS-Studio and build with pedantic (See PR2174)
              General: Shell script fixes thanks to shellcheck
              General: Fixes for GCC 10 and 11
              General: Fixed cross-compilation
              General: Code refactoring, deduplication, cleanup, and misc code improvements
              General: Coverity Scan fixes, which includes memory leaks, race conditions, division by 0, and other issues
              General: PVS Studio improvements,fixes and updates
              General: Code formatting/style fixes
              General: Various fixes and improvements (code, CI, integration tests, coverity)
              General: Update bug reporting template and update the process

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. RedTeam Toolkit
          Red Team Toolkit is an Open-Source Django Offensive Web-App containing useful offensive tools used in the red-teaming together for the security specialist to identify vulnerabilities.
          The cybersecurity open-source projects are integrated with what will be a powerful toolkit together.
          Currently, it supports the following options:
              FullScan (scan ports and vulnerabilities/CVEs on the target – PDF output)
              Livehosts (scan all live hosts in the network scale – PDF output)
              DirScan (scan all directories on a target – PDF output)
              CVE Description ( CveID Search)
              SSH Dictionary Attack
              RDP BruteForce
              WebApps Section
                  F5 BIG-IP PoC ( CVE-2022-1388 )
                  Apache Path Traversal PoC ( CVE-2021-41773 )
                  Automated XSS Finder
                  Web Crawler for gathering URLs
                  SubDomain Enumeration
                  HTTP Verb Tampering
                  (SQLi will be added soon)
              Windows Section (Being updated, other major CVEs will be added)
                  Microsoft Exchange ProxyShell PoC ( CVE-2021-34523, CVE-2021-34473, CVE-2021-31207 )
              Linux Section to implement major Linux CVEs (UNDER MAINTENANCE)
          Changelog v0.1.5
          The Dockerized version (#19 ) of the RedTeam Toolkit. is deployed now Moreover, it now includes the following new modules:
              CVE-2022-1388 PoC (for F5 BIG-IP
              Automated XSS Finder to server a website and find XSS on that
              A new module for content discovery (Gathering all URLs)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Functionalities:
              combo sorter
              email:pass to user:pass
              combo stats
              combo merge
              domain change
              file split
              duplicate remover
              yopmail tools
              yopmail generator (from wordlist)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Online tools provides md2, md5, sha1, sha2, sha512, bas64, html encode / decode functions.

          Hidden Content
          Give reaction to this post to see the hidden content.