Skip to content

Hash Cracking

Hash cracking tools.
Follow Posting Template:
https://forum.hashpwn.net/post/68

27 Topics 129 Posts

Subcategories


  • 2 Topics
    11 Posts
    C
    I do it like this since I'm a windows user I go to cygwin64/home/pcname/JtR/run/rules Use e.g. best64.rule file Copy your hashcat rules to best64.rule file and save and you can run your hashcat rules from file best64.rule That way I don't have to edit my config file since I don't use JtR that often
  • GUI interface for using the hashcat cracking tool.

    2 14
    2 Topics
    14 Posts
    T
    good nice
  • Hashcat, the world's fastest password cracker!

    9 16
    9 Topics
    16 Posts
    cycloneC
    update: hashcat v7.1.1 released https://github.com/hashcat/hashcat/releases/tag/v7.1.1 changelog: * changes v7.1.0 -> v7.1.1 ## ## Improvements ## Docker: Add initial support for AMD GPUs when running Hashcat inside Docker using HIP and OpenCL Hardware Monitor: Suppress fan speed warnings for unified memory setups (typically internal GPUs) Testing Framework: Enable hardware monitor to improve testing of memory-heavy algorithms Unit tests: Updated install_modules.sh to use an external module for Digest::MD6 ## ## Bugs ## - Fixed multi-hash handling in LUKS2 and KeePass (KDBX4), while single-hash remained unaffected * changes v7.0.0 -> v7.1.0 ## ## New Algorithms ## ## Endpoint - Added hash-mode: AS/400 DES - Added hash-mode: AS/400 SSHA1 - Added hash-mode: Blockchain, My Wallet, Legacy Wallets - Added hash-mode: Cisco-ISE Hashed Password (SHA256) - Added hash-mode: Keepass4 - Added hash-mode: SAP CODVN H (PWDSALTEDHASH) isSHA512 - Added hash-mode: sm3crypt $sm3$, SM3 (Unix) ## Primitives, KDFs, Libraries - Added hash-mode: BLAKE2b-256 - Added hash-mode: MD6 (256) ## Constructs - Added hash-mode: BLAKE2b-256($pass.$salt) - Added hash-mode: BLAKE2b-256($salt.$pass) - Added hash-mode: sha224($pass.$salt) - Added hash-mode: sha224($salt.$pass) - Added hash-mode: sha224(sha1($pass)) - Added hash-mode: sha224(sha224($pass)) ## ## Improvements ## - Attack-Modes: Use 64-bit counters for amplifier keyspace - Host Memory: Update method to query free host memory using /proc/meminfo when available - Docker: Add initial support for running hashcat inside Docker - Device Memory: Warn instead of waiting on high GPU memory usage - Backends: Enhanced AMD Windows OpenCL and HIP compatibility for legacy models - Rules: Add early syntax check for -j and -k rules - Device Memory: Do not disable hwmon interface by default in speed-only and progress-only mode - JSON output: Refactor Bridge unit reporting for clarity - Backends: Ignore devices from Microsoft OpenCL D3D12 platform - Building: Add MAINTAINER_MODE flag to disable hardcoded CPU optimization flags - Bash: Add missing parameters to bash completion script - Dependencies: Downgraded unrar source from 6.2.7 to 6.0.5 - Benchmark: Update default hash-mode selection - Libraries: DES and Blowfish restructure - Building: Add initial support for OpenBSD and DragonflyBSD ## ## Bugs ## - Fix broken JSON formatting when using the --status-json flag - Fix issue where -k single rules were ignored when used with -a 1 and -S ## ## Python Bridge ## - Fix unsalted hashlist support - Fix the esalt structure, it was too large - Improve support from 1:1 password-to-hash to 1:N password-to-hashes - Improve stand-alone debugging of Python Bridge stubs - Improve salt/esalt debugging of Python Bridge stubs - Enable potfile output by default for -m 73000 and 72000 ## ## Other changes ## - Argon2: Add argon2_init() wrappers to support private address space - Change hash-category for hash-modes 25600, 25800, 28400 and 30600 to HASH_CATEGORY_RAW_HASH_SALTED - Suppress optimization advice in final approach mode - Backend: Split backend_session_begin() into smaller compute-runtime specific functions - Sanity check: Abort if a custom-charset is defined on the command line and a mask file is used - Building: Disable Argon2 optimized path on RISC-V - Shared: improved 32-bit and 64-bit add and multiply overflow helper functions
  • CPU hash cracking tool.

    2 7
    2 Topics
    7 Posts
    cycloneC
    FYI Crackmon now supports monitoring mdxfind. https://forum.hashpwn.net/post/79
  • Intro to Hash Cracking

    Pinned
    1
    3 Votes
    1 Posts
    210 Views
    No one has replied
  • WPA Keygen List

    2
    1 Votes
    2 Posts
    359 Views
    T
    Do you have a WPA key generator for TP-LINK-XXXX routers?
  • hashes.com Escrow API Tool

    4
    1 Votes
    4 Posts
    2k Views
    cycloneC
    New version released. https://github.com/cyclone-github/hashes.com-escrow-tool/releases/tag/v1.1.2 v1.1.2; 2025-11-21 fixed redundant new line logic added http timeouts Full Changelog: https://github.com/cyclone-github/hashes.com-escrow-tool/compare/v1.1.1...v1.1.2
  • crackmon - Monitor hashcat / mdxfind crackrate

    12
    2 Votes
    12 Posts
    2k Views
    freerouteF
    @v1cvap0r I use an ANS (Automated Notification System) for this purpose. It uses the Python Watchdog module. After startup, it continuously monitors the contents of the hashcat.potfile and the john.pot file. Startup message: ️ Warning. Recovery process has been started. ANS (Automated Notification System) has been activated! It continuously monitors for changes and optionally sends them either via email or as a push message to a Signal or Telegram address. The script requests this data after startup. I also created a service file for playing the sound file. It also uses Watchdog to continuously monitor the contents of the potfiles and plays the sound file I selected.
  • phantom_pwn - Phantom Vault Extractor & Decryptor

    29
    2 Votes
    29 Posts
    5k Views
    G
    Hi. I have a question, is it possible to automatically export the private key of the wallet we unlocked using your tool? Or the mnemonic by any chance. I cannot send @cyclone a DM because my reputation is too low.
  • solflare_pwn - Solflare Vault Extractor & Decryptor

    13
    2 Votes
    13 Posts
    2k Views
    cycloneC
    @Senses DM me on Matrix.
  • atomic_pwn - Atomic Vault Extractor & Decryptor

    8
    1 Votes
    8 Posts
    1k Views
    J
    I have the files from Storage\leveldb\ i cant find the Mnemonic key hash from extractor ? can you help me please ?!!!
  • metamask_pwn - Metamask Vault Extractor & Decryptor

    5
    1 Votes
    5 Posts
    1k Views
    cycloneC
    @deva I moved your reply to the correct Topic. Read through the info above (https://forum.hashpwn.net/post/74) and send me a DM if you still have any questions.
  • yescrypt_crack - Yescrypt Hash Cracker

    2
    2 Votes
    2 Posts
    750 Views
    cycloneC
    Source code v0.2.0; 2025-03-06 uploaded to GitHub. https://github.com/cyclone-github/yescrypt_crack
  • argon_cracker

    1
    2 Votes
    1 Posts
    215 Views
    No one has replied
  • RegX - Potfile Parsing Tool

    1
    2 Votes
    1 Posts
    174 Views
    No one has replied
  • Magento2 Argon2id Hash Converter

    3
    2 Votes
    3 Posts
    341 Views
    cycloneC
    Great job on this tool!

Who's Online [Full List]

7 users active right now (3 members and 4 guests).
hashpwn-bot, freeroute

Board Statistics

Our members have made a total of 7.3k posts in 164 topics.
We currently have 313 members registered.
Please welcome our newest member, jpg0mez.
The most users online at one time was 49 on Thursday, December 26, 2024.