Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      CrackStation

      Recommended Posts

      Staff

      How CrackStation Works

      CrackStation uses massive pre-computed lookup tables to crack password hashes. These tables store a mapping between the hash of a password, and the correct password for that hash. The hash values are indexed so that it is possible to quickly search the database for a given hash. If the hash is present in the database, the password can be recovered in a fraction of a second. This only works for "unsalted" hashes. For information on password hashing systems that are not vulnerable to pre-computed lookup tables, see our hashing security page.

      Crackstation's lookup tables were created by extracting every word from the Wikipedia databases and adding with every password list we could find. We also applied intelligent word mangling (brute force hybrid) to our wordlists to make them much more effective. For MD5 and SHA1 hashes, we have a 190GB, 15-billion-entry lookup table, and for other hashes, we have a 19GB 1.5-billion-entry lookup table.

      Source: 

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. The software is designed to replace domains with domains of the same location. A useful utility for converting valid to new lines. For example, you have a valid .de database: you load these lines into the software, having previously set the criteria for replacing the online.de with gmx.de in the settings, at the output we get new lines with new domains. This method allows you to make new lines, which are likely to pass on the valid.
          How to work with the program? It's that simple.

          1.- Open the program. A window will pop up that there is no settings file and the program will close, a file will be created geo_settings.txt
          2.- Open the created file geo_settings.txt
          3.- We prescribe there the criteria for replacing domains in the format domain_that_we change;domain_to_which_we change (";" is used to correctly separate domains) The number of lines to replace is not limited by the program, but affects the speed.

          Hidden Content
          Give reaction to this post to see the hidden content. Click "Get Started"
          The results will be saved in the format "Input_filename_ReplaceGEO.txt"

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              What is Hacking
              How to Use go language for Hacking
              How to Change MAC address using golang
              How to create a TCP network Scanner
              How to Perform Man in the Middle attack using golang
              Perform Packet capturing and interception
              Create your own malware
              Running Commands remotely on victim
              Navigating File system on victim machine
              Stealing Files and Folders from victim machine
              Uploading Viruses on victim Machine
              Creating your own keylogger
              How to Package your malware into a trojan
          Requirements
              Basics of go language
              A working PC
          Description
          In this course we will learn hacking using Go language.  Go is an open source programming language created by Google. As one of the fastest growing languages in terms of popularity, its a great time to pick up the language and start using it.
          First we start with learning about why we should use go language and what are its advantages. Then we will start diving into what hacking is and what are different types of hacking. We will learn how to keep ourselves secure over LAN by developing a program for changing MAC address. Then we will create a Network Scanner that will help us in scanning devices over our local network and finding out their IP and MAC addresses. During our course, we will explore a lot of aspects of hacking using go language in detail and use important packages for Hacking purposes.
          In the later part of our course, we will start developing programs that will help us in hacking. Firstly we will perform a man in the middle attack using ARP spoofing and then we will intercept traffic between users. Then we will create our own backdoor malware that will give us complete control over the victim machine using a power-shell , i.e you will be able to run commands on the remote PC. We will also develop a functionality to steal user files from his machine using our backdoor.
          Who this course is for:
              Go language programmers who want to learn hacking
              people who want to learn fundamentals of hacking
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Online Proxy Scraper, Filter And Checker
          You Can Use This Tool Online, No Need To Download Anything
          Link:

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Pollenisator is a tool aiming to assist pentesters and auditor automating the use of some tools/scripts and keep track of them.
              Written in python 3
              Provides a modelisation of "pentest objects" : Scope, Hosts, Ports, Commands, Tools etc.
              Tools/scripts are separated into 4 categories : wave, Network/domain, IP, Port
              Objects are stored in a NoSQL DB (Mongo)
              Keep links between them to allow queries
              Objects can be created through parsers / manual input
              Business logic can be implemented (auto vuln referencing, item triggers, etc.)
              Many tools/scripts launch conditions are availiable to avoid overloading the target or the scanner.
              A GUI based on tcl/tk
          Features
              Register your own tools
                  Add command line options in your database.
                  Create your own light plugin to parse your tool output.
                  Use the objects Models to add, update or delete objects to the pentest inside plugins.
                  Limit the number of parallel execution of noisy/heavy tools
              Define a recon/fingerprinting procedure with custom tools
                  Choose a period to start and stop the tools
                  Define your scope with domains and network IP ranges.
                  Custom settings to include new hosts in the scope
                  Keep results of all files generated through tools executions
                  Start the given docker to implement numerous tools for LAN and Web pentest
              Collaborative pentests
                  Split the work between your machines by starting one worker by computer you want to use.
                  Tags ip or tools to show your team mates that you powned it.
                  Take notes on every object to keep trace of your discoveries
                  Follow tools status live
                  Search in all your objects properties with the fitler bar.
                  have a quick summary of all hosts and their open ports and check if some are powned.
              Reporting
                  Create security defects on IPs and ports
                  Make your plugins create defects directly so you don't have to
                  Generate a Word report of security defects found. You can use your own template with extra work.
                  Generate a Powerpoint report of security defects found. You can use your own template with extra work.
              Currently integrated tools
                  IP / port recon : Nmap (Quick nmaps followed by thorough scan)
                  Domain enumeration : Knockpy, Sublist3r, dig reverse, crtsh
                  Web : WhatWeb, Nikto, http methods, Dirsearch
                  LAN : Crackmapexec, eternalblue and bluekeep scan, smbmap, anonymous ftp, enum4linux
                  Unknown ports : amap, nmap scripts
                  Misc : ikescan, ssh_scan, openrelay
          Roadmap
              Change the architecture to an API based one
              Get rid of Celery
              Add flexibity for commands
              Improve UX
              Add more plugin and improve existing ones
              Add real support for users / authenticated commands

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.