Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Hash ID v1.1​​​​​​​ hash-identifier

      Recommended Posts

      Staff

      Software para identificar los diferentes tipos de hashes utilizados para encriptar datos y especialmente contraseñas.

      Formatos de cifrado compatibles:

      ADLER-32

      CRC-32

      CRC-32B

      CRC-16

      CRC-16-CCITT

      DES (Unix)

      FCS-16

      GHash-32-3

      GHash-32-5

      GOST R 34.11-94

      Haval-160

      Haval-192 110080, Haval-224 114080, Haval-256

      Lineage II C4

      Credenciales en caché de dominio

      XOR-32

      MD5 (Mitad)

      MD5 (Medio)

      MySQL

      MD5 (phpBB3)

      MD5 (Unix)

      MD5 (Wordpress)

      MD5 (APR)

      Haval-128

      MD2

      MD4

      MD5

      MD5 (HMAC (Wordpress))

      NTLM

      RAdmin v2.x

      RipeMD-128

      SNEFRU-128

      Tiger-128

      MySQL5 - SHA-1 (SHA-1 ($ pase))

      MySQL 160bit - SHA-1 (SHA-1 ($ pase))

      RipeMD-160

      SHA-1

      SHA-1 (MaNGOS)

      Tiger-160

      Tiger-192

      md5 ($ pass. $ salt) - Joomla

      SHA-1 (Django)

      SHA-224

      RipeMD-256

      SNEFRU-256

      md5 ($ pass. $ salt) - Joomla

      SAM - (LM_hash: NT_hash)

      SHA-256 (Django)

      RipeMD-320

      SHA-384

      SHA-256

      SHA-384 (Django)

      SHA-512

      Torbellino

      Y más…

      Algoritmos de cifrado que no se pueden diferenciar a menos que se hayan descifrado, por lo que la eficacia del software también depende de los criterios del usuario.

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Beaconator
          Beaconator is an aggressor script for Cobalt Strike used to generate a raw stageless shellcode and packing the generated shellcode using PEzor.
          Changelog v1.1
              Fixed error check with the use of x86 arch & syscalls
              Fixed the “null value error” due to missing output folder
              Fixed issue with options persisting to subsequent payload generations
              Added PEzor’s BOF format
              Added the -cleanup option for BOFs
              Added the -sleep option
              Added more error checks
              Cleaned up the code

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. It Can Crack
              Md5     Sha-1     Sha-224     Sha-256     Sha-384     Sha-512     Mysql-4.1+     Salted Md5 Hash     mssql2005     nthash
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A fast proxy checker made in Java.
          Requirements
          IDE IntelliJ IDEA 2021.1
          JavaToolkit v1.4 for Release versions, v1.4 for Dev code
          AdoptOpenJDK 11

          Nano Proxy v1.1
          Tons of changes, but the most notable ones :
              Much better accuracy.
              Added CPM in the title.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Recon
          The step of recognizing a target in both Bug Bounties and Pentest can be very time-consuming. Thinking about it, I decided to create my own recognition script with all the tools I use most in this step. All construction of this framework is based on the methodologies of @ofjaaah and @Jhaddix. These people were my biggest inspirations to start my career in Information Security and I recommend that you take a look at their content, you will learn a lot!
          Feature
          ASN Enumeration
              metabigor
          Subdomain Enumeration
              Assetfinder
              Subfinder
              Amass
              Findomain
              Sublist3r
              Knock
              SubDomainizer
              GitHub Sudomains
              RapidDNS
              Riddler
              SecurityTrails
          Alive Domains
              httprobe
              httpx
          WAF Detect
              wafw00f
          Domain organization
              Regular expressions
          Subdomain Takeover
              Subjack
          DNS Lookup
          Discovering IPs
              dnsx
          DNS Enumeration and Zone Transfer
              dnsrecon
              dnsenum
          Favicon Analysis
              favfreak
              Shodan
          Directory Fuzzing
              ffuf
          Google Hacking
              Some Dorks that I consider important
              CredStuff-Auxiliary
              Googler
          GitHub Dorks
              Jhaddix Dorks
          Credential Stuffing
              CredStuff-Auxiliary
          Screenshots
              EyeWitness
          Port Scan
              Masscan
              Nmap
              Naabu
          Link Discovery
          Endpoints Enumeration and Finding JS files
              Hakrawler
              Waybackurls
              Gospider
              ParamSpider
          Vulnerabilities
              Nuclei ➔ I used all the default templates
          403 Forbidden Bypass
              Bypass-403
          XSS
              XSStrike
              Gxss
          LFI
              Oneliners
                  gf
                  ffuf
          RCE
              My GrepVuln function
          Open Redirect
              My GrepVuln function
          SQLi
              Oneliners
                  gf
                  sqlmap

          Hidden Content
          Give reaction to this post to see the hidden content.