Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Hash ID v1.1​​​​​​​ hash-identifier

      Recommended Posts

      Staff

      Software para identificar los diferentes tipos de hashes utilizados para encriptar datos y especialmente contraseñas.

      Formatos de cifrado compatibles:

      ADLER-32

      CRC-32

      CRC-32B

      CRC-16

      CRC-16-CCITT

      DES (Unix)

      FCS-16

      GHash-32-3

      GHash-32-5

      GOST R 34.11-94

      Haval-160

      Haval-192 110080, Haval-224 114080, Haval-256

      Lineage II C4

      Credenciales en caché de dominio

      XOR-32

      MD5 (Mitad)

      MD5 (Medio)

      MySQL

      MD5 (phpBB3)

      MD5 (Unix)

      MD5 (Wordpress)

      MD5 (APR)

      Haval-128

      MD2

      MD4

      MD5

      MD5 (HMAC (Wordpress))

      NTLM

      RAdmin v2.x

      RipeMD-128

      SNEFRU-128

      Tiger-128

      MySQL5 - SHA-1 (SHA-1 ($ pase))

      MySQL 160bit - SHA-1 (SHA-1 ($ pase))

      RipeMD-160

      SHA-1

      SHA-1 (MaNGOS)

      Tiger-160

      Tiger-192

      md5 ($ pass. $ salt) - Joomla

      SHA-1 (Django)

      SHA-224

      RipeMD-256

      SNEFRU-256

      md5 ($ pass. $ salt) - Joomla

      SAM - (LM_hash: NT_hash)

      SHA-256 (Django)

      RipeMD-320

      SHA-384

      SHA-256

      SHA-384 (Django)

      SHA-512

      Torbellino

      Y más…

      Algoritmos de cifrado que no se pueden diferenciar a menos que se hayan descifrado, por lo que la eficacia del software también depende de los criterios del usuario.

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Malware string hash lookup plugin for IDA Pro. This plugin connects to the OALABS HashDB Lookup Service.
          Adding New Hash Algorithms
          The hash algorithm database is open source and new algorithms can be added on GitHub here. Pull requests are mostly automated and as long as our automated tests pass the new algorithm will be usable on HashDB within minutes.
          Installing HashDB
          Before using the plugin you must install the python requests module in your IDA environment. The simplest way to do this is to use pip from a shell outside of IDA. (pip install requests)
          Once you have the requests module installed simply copy the latest release of hashdb.py into your IDA plugins directory and you are ready to start looking up hashes!

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Defender Tools — The program allows you to add or remove a folder or file in exceptions Windows Defender.
          OS: Windows 10 (x86-x64)
          Language: ML / ENG / RUS
          Size: 0,277 MB.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Avast Ransomware Decryption Tools – contains all 20 available ransomware decrypters available from Avast.
          Currently, Avast has free tools to unlock (decrypt) computers infected with the following ransomware.
          • AES_NI
          • Alcatraz Locker
          • Apocalypse
          • BadBlock
          • Bart
          • BTCWare
          • Crypt888
          • CryptoMix (Offline)
          • CrySiS
          • EncrypTile
          • FindZip
          • Globe HiddenTear
          • Jigsaw
          • Legion NoobCrypt
          • Stampado
          • SZFLocker
          • TeslaCrypt
          • XData

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. RapidScan – The Multi-Tool Web Vulnerability Scanner
          It is quite a fuss for a pentester to perform binge-tool-scanning (running security scanning tools one after the other) sans automation. Unless you are a pro at automating stuff, it is a herculean task to perform binge-scan for each and every engagement. The ultimate goal of this program is to solve this problem through automation; viz. running multiple scanning tools to discover vulnerabilities, effectively judge false-positives, collectively correlate results and saves precious time; all these under one roof.
          Features
              one-step installation.
              executes a multitude of security scanning tools, does other custom coded checks and prints the results spontaneously.
              some of the tools include nmap, dnsrecon, wafw00f, uniscan, sslyze, fierce, lbd, theharvester, dnswalk, golismeroetc executes under one entity.
              saves a lot of time, indeed a lot of time!.
              checks for same vulnerabilities with multiple tools to help you zero-in on false positives effectively.
              legends to help you understand which tests may take longer time, so you can Ctrl+C to skip if needed.
              vulnerability definitions guide you what the vulnerability actually is and the threat it can pose. (under development)
              remediations tell you how to plug/fix the found vulnerability. (under development)
              executive summary gives you an overall context of the scan performed with critical, high, low and informational issues discovered. (under development)
              artificial intelligence to deploy tools automatically depending upon the issues found. for eg; automates the launch of wpscan and plecost tools when a wordpress installation is found. (under development)
          Vulnerability Checks
              ✔️ DNS/HTTP Load Balancers & Web Application Firewalls.
              ✔️ Checks for Joomla, WordPress, and Drupal
              ✔️ SSL related Vulnerabilities (HEARTBLEED, FREAK, POODLE, CCS Injection, LOGJAM, OCSP Stapling).
              ✔️ Commonly Opened Ports.
              ✔️ DNS Zone Transfers using multiple tools (Fierce, DNSWalk, DNSRecon, DNSEnum).
              ✔️ Sub-Domains Brute Forcing.
              ✔️ Open Directory/File Brute Forcing.
              ✔️ Shallow XSS, SQLi, and BSQLi Banners.
              ✔️ Slow-Loris DoS Attack, LFI (Local File Inclusion), RFI (Remote File Inclusion) & RCE (Remote Code Execution).
              & more coming up…

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. CRACK AND CHECK HASH TYPES IN BULK
          This is a hacking tool used to find encrypted passwords, this tool will automatically find the hash type and will describe it directly This tool uses 50 hash algorithms, so it will check and read the encrypted hashes one by one.
          Avaliable hash engine to crack: md2 md4 md5 sha1 sha224 sha256 sha384 sha512/224 sha512/256 sha512 sha3-224 sha3-256 sha3-384 sha3-512 ripemd128 ripemd160 ripemd256 ripemd320 whirlpool tiger128,3 tiger160,3 tiger192,3 tiger128,4 tiger160,4 tiger192,4 snefru snefru256 gost gost-crypto adler32 crc32 crc32b crc32c fnv132 fnv1a32 fnv164 fnv1a64 joaat haval128,3 haval160,3 haval192,3 haval224,3 haval256,3 haval128,4 haval160,4 haval192,4 haval224,4 haval256,4 haval128,5 haval160,5 haval192,5 haval224,5 haval256,5

          Hidden Content
          Give reaction to this post to see the hidden content.