Skip to content

Tools

Discuss useful tools related to hash cracking. Do not upload binaries or post links to malicious files.
Follow Posting Template:
https://forum.hashpwn.net/post/68

44 Topics 145 Posts

Subcategories


  • Matrix - Encrypted Chat

    1 2
    1 Topics
    2 Posts
    No new posts.
  • Private search engine hosted by hashpwn, powered by searXNG.

  • Encrypted pastebin hosted by hashpwn, powered by PrivateBin.

  • Hash cracking tools.
    Follow Posting Template:
    https://forum.hashpwn.net/post/68

    25 106
    25 Topics
    106 Posts
    I
    @cyclone Hello!, I'm trying to regain access to my Phantom wallet after reinstalling Windows and forgetting to save my seed phrase. Using the Windows.old files and your guide, I’ve walked through the process up to the decryption step. What should I do next to recover the seed phrase? Thank you. [image: 1760428071696-gtf.png]
  • Network related tools for web scraping, IP / domain lookups , etc.
    Follow Posting Template:
    https://forum.hashpwn.net/post/68

    4 10
    4 Topics
    10 Posts
    cycloneC
    New release: v1.0.0; 2025-08-27 - stable v1.0.0 release - enforce Jotti's 250MB max file limit - added upload progress bar - added HTTP client timeout to avoid hangs - added non-zero exit on rate limit - tidied up logic in URL, filename, directory parsing
  • Share and discuss scripts that help automate hash cracking and related tasks. Zero tolerance for malicious content.
    Follow Posting Template:
    https://forum.hashpwn.net/post/68

    5 6
    5 Topics
    6 Posts
    A1131A
    #!/bin/bash # simple script to save your time on file operations while cracking vBulletin < 3.8.5 hashes without salts using hashcat # popular types of vBulletin salt - ?a?a?a, ?h?h?h?h?h?h, ?d?d?d?d?d # download hashgen - https://github.com/cyclone-github/hashgen (used to convert $[HEX] hashes with colon-containing salts and generating hashed wordlist) # Function to read file paths with validation read_file_path() { local prompt="$1" local result_var="$2" local path while true; do read -r -p "$prompt" path if [ -f "$path" ]; then # Use eval to set the variable passed by name eval "$result_var=\"$path\"" break else echo "ERROR: File not found: $path. Please try again." fi done } echo "--- Interactive vBulletin Salt Cracker Configuration ---" # --- Input Acquisition --- # 1. Hash list path read_file_path "Enter the path to the hash list (e.g., hashlists/main.txt): " HASHLIST_PATH # 2. Wordlist path read_file_path "Enter the path to the wordlist (e.g., wordlists/top1000.txt): " WORDLIST_PATH # 3. Mask (optional, with default value) read -r -p "Enter the mask for salt cracking (e.g., ?h?h?h?h?h?h) [Default: ?a?a?a]: " CRACKING_MASK if [ -z "$CRACKING_MASK" ]; then CRACKING_MASK="?a?a?a" fi # Generate dynamic paths WORDLIST_BASENAME=$(basename "$WORDLIST_PATH") HASHED_WORDLIST_PATH="md5_wordlists/${WORDLIST_BASENAME}.md5" echo "--- Settings Confirmed ---" echo "Hash List: $HASHLIST_PATH" echo "Word List: $WORDLIST_PATH" echo "Mask: $CRACKING_MASK" echo "Hashed Word List Output: $HASHED_WORDLIST_PATH" echo "------------------------------" sleep 2s # --- Tool Verification --- if ! command -v hashcat &> /dev/null; then echo "ERROR: hashcat not found. Ensure it is in your PATH." exit 1 fi if [ ! -f ./hashgen ]; then echo "ERROR: The ./hashgen file was not found. Ensure it is in the current directory and is executable." exit 1 fi # --- STEP 1: Potfile Cleanup --- echo "--- STEP 1: Cleaning potfile ---" if [ -f "hashed.pot" ]; then echo "Creating backup: hashed.pot -> hashed.pot.bak" cat hashed.pot >> hashed.pot.bak 2>/dev/null else echo "hashed.pot not found, skipping backup." fi echo '' > hashed.pot sleep 3s # --- STEP 2: Generate Hashed Wordlist --- echo "--- STEP 2: Generating hashed wordlist ---" mkdir -p md5_wordlists ./hashgen -m 0 -w "$WORDLIST_PATH" -o "$HASHED_WORDLIST_PATH" sleep 3s # --- STEP 3: Crack Salts --- echo "--- STEP 3: Cracking salts (Mode -m0 -a6) ---" hashcat -d1 -m0 -a6 -w4 --hwmon-temp-abort=95 --potfile-path=hashed.pot "$HASHLIST_PATH" "$HASHED_WORDLIST_PATH" "$CRACKING_MASK" --remove sleep 3s # --- STEP 4: Prepare Hashes for Wordlist Cracking --- echo "--- STEP 4: Preparing hashes for cracking (m2611 format) ---" sleep 3s # 1. Process NON-HEX lines (already cracked passwords) # Corrected format: HASH:PLAINTEXT (Single colon) grep -v HEX hashed.pot | sed 's/^\(.\{65\}\)/\1:/' | cut -d: -f1,3 | sed -E 's/^(.{32}):(.*)$/\1:\2/' > 2611_to_crack.txt sleep 3s echo "Converting HEX strings" # 2. Convert HEX strings grep HEX hashed.pot | cut -d: -f2 > hex.tmp grep HEX hashed.pot | cut -d: -f1 > hash.txt ./hashgen -m plaintext -w hex.tmp -o hex.txt sleep 3s # 3. Combine HEX hashes and append to 2611_to_crack.txt # Corrected format: HASH:HEX_SALT (Single colon) paste -d : hash.txt hex.txt | sed -E 's/^(.{32}):(.*)$/\1:\2/' >> 2611_to_crack.txt sleep 3s echo "Deleting temporary files" # 4. Remove temporary files rm -f ./{hash.txt,hex.txt,hex.tmp} sleep 3s # --- STEP 5: Crack Hashes with Wordlist (Mode -m2611) --- echo "--- STEP 5: Cracking hashes with wordlist -a0 -m2611 ---" hashcat -d1 -m2611 -a0 -w4 --potfile-path=hashcat.pot.salted 2611_to_crack.txt "$WORDLIST_PATH" sleep 3s # --- STEP 6: Export Cracked Hashes --- echo "--- STEP 6: Writing/Appending last cracked hashes into file ---" hashcat -d1 -m2611 -a0 -w4 -O --hwmon-temp-abort=95 --hwmon-disable --potfile-path=hashcat.pot.salted 2611_to_crack.txt --show > 2611_cracked.txt sleep 3s echo "Done." Preview
  • Tools for text, wordlist, hashcat rules, etc.
    Follow Posting Template:
    https://forum.hashpwn.net/post/68

    9 21
    9 Topics
    21 Posts
    cycloneC
    As an experimental POC, I rewrote hashgen v1.2.0-dev in Rust. This is a major update to the previous hashgen (Rust) released in 2024 and includes most of the features in hashgen (Go) v1.2.0-dev. Consider this experimental and not for production. https://github.com/cyclone-github/hashgen-testing/tree/main/hashgen_rust hashgen (Rust) $ ./hashgen.bin --version hashgen v1.2.0-rust https://github.com/cyclone-github/hashgen $ ./hashgen.bin -m md5 -w rockyou.txt -b Starting... Processing file: rockyou.txt Hash function: md5 CPU Threads: 16 Finished processing 14344390 lines in 0.453 sec (31.639 M lines/sec) hashgen (Go) $ hashgen -version hashgen v1.2.0-dev; 2025-09-20.2300 https://github.com/cyclone-github/hashgen $ hashgen -m md5 -w rockyou.txt -b 2025/09/23 17:29:51 Starting... 2025/09/23 17:29:51 Processing file: rockyou.txt 2025/09/23 17:29:51 Hash function: md5 2025/09/23 17:29:51 CPU Threads: 16 2025/09/23 17:29:52 Finished processing 14344391 lines in 0.437 sec (32.792 M lines/sec)

Who's Online [Full List]

6 users active right now (3 members and 3 guests).
cyclone, hashpwn-bot

Board Statistics

Our members have made a total of 4.7k posts in 152 topics.
We currently have 270 members registered.
Please welcome our newest member, immolatje.
The most users online at one time was 49 on Thursday, December 26, 2024.