Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Md5 Cracker Tool Priv (Not Brute)

      1 post in this topic

      Hidden Content

        Give reaction to this post to see the hidden content.

       

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      level23hacktools.com

      • Like 6
      • Thanks 1

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. identYwaf is an identification tool that can recognize web protection type (i.e. WAF) based on blind inference. The blind inference is being done by inspecting responses provoked by a set of predefined offensive (non-destructive) payloads, where those are used only to trigger the web protection system in between (e.g. http://<host>?aeD0oowi=1 AND 2>1). Currently, it supports more than 60 different protection products (e.g. aeSecure, Airlock, CleanTalk, CrawlProtect, Imunify360, MalCare, ModSecurity, Palo Alto, SiteGuard, UrlScan, Wallarm, WatchGuard, Wordfence, etc.), while the knowledge-base is constantly growing.
          Also, as part of this project, screenshots of characteristic responses for different web protection systems are being gathered (manually) for the future reference.
          Changelog v1.0.118
          Adding signatures for new WAF (Wapples)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Cat-Nip Automated Basic Pentest Tool
          this tool will make your basic pentesting task like Information Gathering, Auditing, And Reporting so this tool will do every task fully automatic.
          Pentest Tools Auto Executed With Cat-Nip
              Whois Lookup     DNSmap     Nmap     Dmitry     Theharvester     Load Balancing Detector     SSLyze     Automater     Ua Tester     Gobuster     Grabber     Parsero     Uniscan     And More Tool Soon
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Penta (PENTest + Automation tool)
          Penta is a Pentest automation tool using Python3.
          Main menu
              Port scanning     To check ports for a target. Log output supported.     Nmap     To check ports by additional means using nmap     Check HTTP option methods     To check the methods (e.g. GET, POST) for a target.     Grab DNS server info     To show the info about DNS server.     Shodan host search To collect host service info from Shodan. Request Shodan API key to enable the feature.     FTP connect with anonymous To check if it has anonymous access activated in port 21. FTP users can authenticate themselves using the plain text sign-in protocol (Typically username and password format), but they can connect anonymously if the server is configured to allow it. Anyone can log in to the server if the administrator has allowed an FTP connection with anonymous login.     SSH connect with Brute Force To check ssh connection to scan with Brute Force. Dictionary data is in data/dict.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Dirble is a website directory scanning tool for Windows and Linux. It’s designed to be fast to run and easy to use.
          Changelog v1.4
          Added
              Add ability to do scans using HEAD and POST requests
              Directories which return 401 and 403 codes are no longer scanned by default
              Not found detection now can detect response lengths that vary by the URL length
              Added dockerfile to git repository
              Commit hashes are now displayed with the version number in local builds
          Changed
              Wordlist items now have a leading and trailing slash removed
              Default wordlist location checks have been improved
              SimpleLog crate now used to print additional scanning information
              Silent and verbose flags now affect logging level
              Output for listable directories now has a bold L
              Wordlist splitting of initial URLs is increased
          Fixed
              Disable recursion flag now works as intended
              Validator always defaulting to 404


          Hidden Content
          Give reaction to this post to see the hidden content.