Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Hash ID v1.1​​​​​​​ hash-identifier

      Recommended Posts

      Staff

      Software para identificar los diferentes tipos de hashes utilizados para encriptar datos y especialmente contraseñas.

      Formatos de cifrado compatibles:

      ADLER-32

      CRC-32

      CRC-32B

      CRC-16

      CRC-16-CCITT

      DES (Unix)

      FCS-16

      GHash-32-3

      GHash-32-5

      GOST R 34.11-94

      Haval-160

      Haval-192 110080, Haval-224 114080, Haval-256

      Lineage II C4

      Credenciales en caché de dominio

      XOR-32

      MD5 (Mitad)

      MD5 (Medio)

      MySQL

      MD5 (phpBB3)

      MD5 (Unix)

      MD5 (Wordpress)

      MD5 (APR)

      Haval-128

      MD2

      MD4

      MD5

      MD5 (HMAC (Wordpress))

      NTLM

      RAdmin v2.x

      RipeMD-128

      SNEFRU-128

      Tiger-128

      MySQL5 - SHA-1 (SHA-1 ($ pase))

      MySQL 160bit - SHA-1 (SHA-1 ($ pase))

      RipeMD-160

      SHA-1

      SHA-1 (MaNGOS)

      Tiger-160

      Tiger-192

      md5 ($ pass. $ salt) - Joomla

      SHA-1 (Django)

      SHA-224

      RipeMD-256

      SNEFRU-256

      md5 ($ pass. $ salt) - Joomla

      SAM - (LM_hash: NT_hash)

      SHA-256 (Django)

      RipeMD-320

      SHA-384

      SHA-256

      SHA-384 (Django)

      SHA-512

      Torbellino

      Y más…

      Algoritmos de cifrado que no se pueden diferenciar a menos que se hayan descifrado, por lo que la eficacia del software también depende de los criterios del usuario.

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Linux evil toolkit is a framework that aims to centralize, standardize, and simplify the use of various security tools for pentest professionals. LETK has few simple commands, one of which is the INIT that allows you to define a target, and thus use all the tools without typing anything else.
          Is LETK better than setoolkit? Yes and no, there are two that serve the same thing and in a different way, the LETK and an automated attack information automation script.
          § 1 About use
          This script was made to automate the steps of gathering information about web targets, the misuse, and the responsibility of the user, to report bugs or make suggestions open a report on github.
          § 2 About simple_scan
          Automap was replaced by simple_scan, it is lighter and faster, in addition to being less detectable, now it has different modes of execution that make it possible from a quick and simple execution to more complex modes.
          § 3 About Console
          The output of the script can be extremely long, so see if your console,  (gnome-terminal, cmd, konsole) is configured to display 1000 lines  (I particularly recommend 10,000 lines), for professional purposes it allows the documentation, it records the commands, exits, and formats the text.
          Changelog v4.7.9
              code review
              code style review
              update fakedump
              update Readme
              fixing many small bugs
              fixing dependencies
              update install-module. but not work

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Changelog:
           - Added config.ini file
           - Solved Discord RPC bug (you can enable or disable the option)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease.
          Features
          FinalRecon provides detailed information such as :
              Header Information
              Whois
              SSL Certificate Information
              Crawler
              DNS Enumeration
                  A, AAAA, ANY, CNAME, MX, NS, SOA, TXT Records
                  DMARC Records
              Subdomain Enumeration
                  Data Sources
                      BuffOver
                      crt.sh
                      ThreatCrowd
                      AnubisDB
                      ThreatMiner
              Traceroute
                  Protocols
                      UDP
                      TCP
                      ICMP
              Directory Searching
              Port Scan
                  Fast
                  Top 1000 Ports
                  Open Ports with Standard Services
              Export
                  Formats
                      txt
                      xml
                      csv
          Changelog v1.1.0
              root is not required, other minor changes

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Andriller CE (Community Edition)
          Andriller – is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. It has features, such as powerful Lockscreen cracking for Pattern, PIN code, or Password; custom decoders for Apps data from Android (some Apple iOS & Windows) databases for decoding communications. Extraction and decoders produce reports in HTML and Excel formats.
          Features
              Automated data extraction and decodingThis feature allows importing individual App database files for automated parsing of the data. There are decoders mainly for Android and some for Apple iOS Apps. Once successfully decoded, reports will be shown on your web browser. Databases can be exported from mainstream forensic tools, such as XRY, UFED Cellebite, Oxygen Forensic, and imported into Andriller for individual decoding. The output from Andriller offers cleaner output data.
              Data extraction of non-rooted without devices by Android Backup (Android versions 4.x, varied/limited support)
              Data extraction with root permissions: root ADB daemon, CWM recovery mode, or SU binary (Superuser/SuperSU)
              Data parsing and decoding for Folder structure, Tarball files (from nanddroid backups), and Android Backup (backup.ab files)This will parse folder structures from Android filesystems and will produce Andriller style reports. These could be exports of the filesystem from raw image files, or from ‘adb pull /data’ extractions, or unpacked ‘.tar’ files content.Tarball Files This will parse and decode nanddroid backup files such as ‘data.tar’ (including concatenated files), and will produce Andriller style reports. Nanddroid tarball backups are usually produced by custom recoveries, such as ClockWorkMod and TWRP.Android Backup Files This will parse and decode ‘backup.ab’ files, and will produce Andriller style reports.
              Selection of individual database decoders for Android apps
              Decryption of encrypted WhatsApp archived databases (.crypt to .crypt12, must have the right key file)
              Lockscreen cracking for Pattern, PIN, Password (not gatekeeper)
              Unpacking the Android backup files
              Screen capture of a device’s display screen
          Changelog v3.5.2
              Switched timeouts to wrapt_timeout_decorator to fix bug with Python 3.8

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. PHP Tools for Visual Studio
          Turn Visual Studio into a powerful PHP development environment
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.