Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Cracking Passwords Version 1.1 by: J. Dravet

      Recommended Posts

      Staff
      Spoiler

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. 100% Speedrun TryHackMe Crack the Hashes 2.13 seconds
          Tired of going to every website to crack your hash? Search-That-Hash automates this process in less then 2 seconds. Search-That-Hash searches the most popular hash cracking sites and automatically inputs your hash(s) for cracking
          Please note that this in alpha stage so do not expect it to be perfect 🙂 For bugs please open an issue.
          🔍 Features
              ⌨️ Auto-Type Identification - No need to know the hash type, Search-That-Hash uses Name-That-Hash to get accurate results on the type of the hash.
              📵 Offline Mode - Not connected to the internet? No worries, Search-That-Hash will automatically run Hashcat for you.
              💨 Fast - We're all busy people and that's why we've dedicated time to make Search-That-Hash as fast as possible.
              🦾 JSON API - As well as JSON output for CLI we also offer an API.
              ♿ Accessible - We are 100% Accessible.
              🎫 Extensible - Adding sites to Search-That-Hash is as easy as printing "hello world" !
              🌈 Beautiful - The colours were hand-selected to be as gnarly and accessible as possible .
              ☮️ Ethical - We search hashes ethically and legally.


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. KMS Bandit Full – The program to activate Windows licenses: 10, 8.1, 8 and activation of Office licenses: 2013, 2016, 2019.
          the KMS Bandit of Full is a program for activating the licenses for Windows: 10, 8, 8.1 and Office: 2010 2013 2016, 2019.
          Features
          • Easy to Use program
          • Activate any version of Windows & Office
          • Multiligual
          What’s New
          * accelerated the activation process

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Scan for a target wireless network. Launch the Handshake Snooper attack. Capture a handshake (necessary for password verification). Launch Captive Portal attack. Spawns a rogue (fake) AP, imitating the original access point. Spawns a DNS server, redirecting all requests to the attacker’s host running the captive portal. Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.