Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Hashcat v6.2.2 - advanced password recovery utility


itsMe

Recommended Posts

This is the hidden content, please

hashcat is the world’s fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and OSX, and has facilities to help enable distributed password cracking.

Features

        World’s fastest password cracker
        World’s first and only in-kernel rule engine
        Free
        Open-Source (MIT License)
        Multi-OS (Linux, Windows and macOS)
        Multi-Platform (CPU, GPU, DSP, FPGA, etc., everything that comes with an OpenCL runtime)
        Multi-Hash (Cracking multiple hashes at the same time)
        Multi-Devices (Utilizing multiple devices in same system)
        Multi-Device-Types (Utilizing mixed device types in same system)
        Supports password candidate brain functionality
        Supports distributed cracking networks (using overlay)
        Supports interactive pause / resume
        Supports sessions
        Supports restore
        Supports reading password candidates from file and stdin
        Supports hex-salt and hex-charset
        Supports automatic performance tuning
        Supports automatic keyspace ordering markov-chains
        Built-in benchmarking system
        Integrated thermal watchdog
        200+ Hash-types implemented with performance in mind
        … and much more

Changelog v6.2.2

    ## Algorithms
    ##

    – Added hash-mode: bcrypt(md5($pass)) / bcryptmd5
    – Added hash-mode: bcrypt(sha1($pass)) / bcryptsha1
    – Added hash-mode: FortiGate256 (FortiOS256)
    – Added hash-mode: Linux Kernel Crypto API (2.4)
    – Added hash-mode: MurmurHash
    – Added hash-mode: OpenEdge Progress Encode
    – Added hash-mode: md5(utf16le($pass))
    – Added hash-mode: sha1(utf16le($pass))
    – Added hash-mode: sha256(utf16le($pass))
    – Added hash-mode: sha384(utf16le($pass))
    – Added hash-mode: sha512(utf16le($pass))
    – Added hash-mode: md5(md5(md5($pass)))
    – Added hash-mode: sha1(sha1($salt.$pass.$salt))
    – Added hash-mode: sha256($salt.sha256($pass))
    – Added hash-mode: sha384($pass.$salt)
    – Added hash-mode: sha384($salt.$pass)
    – Added hash-mode: sha384($salt.utf16le($pass))
    – Added hash-mode: sha384(utf16le($pass).$salt)

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.