Skip to content
  • hashgen - the blazingly fast hash generator

    Text / Wordlist / Rules
    7
    1 Votes
    7 Posts
    2k Views
    cycloneC
    As an experimental POC, I rewrote hashgen v1.2.0-dev in Rust. This is a major update to the previous hashgen (Rust) released in 2024 and includes most of the features in hashgen (Go) v1.2.0-dev. Consider this experimental and not for production. https://github.com/cyclone-github/hashgen-testing/tree/main/hashgen_rust hashgen (Rust) $ ./hashgen.bin --version hashgen v1.2.0-rust https://github.com/cyclone-github/hashgen $ ./hashgen.bin -m md5 -w rockyou.txt -b Starting... Processing file: rockyou.txt Hash function: md5 CPU Threads: 16 Finished processing 14344390 lines in 0.453 sec (31.639 M lines/sec) hashgen (Go) $ hashgen -version hashgen v1.2.0-dev; 2025-09-20.2300 https://github.com/cyclone-github/hashgen $ hashgen -m md5 -w rockyou.txt -b 2025/09/23 17:29:51 Starting... 2025/09/23 17:29:51 Processing file: rockyou.txt 2025/09/23 17:29:51 Hash function: md5 2025/09/23 17:29:51 CPU Threads: 16 2025/09/23 17:29:52 Finished processing 14344391 lines in 0.437 sec (32.792 M lines/sec)
  • Infosec News

    General Discussion
    82
    1
    1 Votes
    82 Posts
    8k Views
    cycloneC
    WhatsApp Zero-Click Hack - CVE-2025-55177 [image: 1758294205795-31216b18-5965-4b8c-b4cf-8995160a5278-image-resized.png] A recently patched zero-click exploit in WhatsApp (CVE-2025-55177), combined with an Apple OS flaw (CVE-2025-43300), allowed attackers to silently install spyware on iOS and Mac devices. The campaign ran for 90 days and targeted fewer than 200 people worldwide, mainly activists and journalists. Victims’ messages, photos, locations, and device data could be exposed without any user action. While mass users were not affected, the flaw remained dangerous until fixed. Sources: https://apnews.com/article/whatsapp-security-vulnerability-update-0e5081c3eeb44e47e39ddd38c29a6771 https://techcrunch.com/2025/08/29/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware/
  • hashpwn wordlist

    Pinned Wordlists
    9
    6 Votes
    9 Posts
    1k Views
    R
    @cyclone Thanks!
  • hashes.com Escrow API Tool

    Hash Cracking
    3
    1 Votes
    3 Posts
    561 Views
    cycloneC
    New version released. https://github.com/cyclone-github/hashes.com-escrow-tool/releases/tag/v1.1.1 Changelog: updated print statements to use stdout / stderr where applicable beta: added escrow websocket monitor (option #9) beta: added -websocket flag to start tool in escrow websocket monitor mode
  • 940k MD5 Hashes

    Standard: MD5, SHA1, SHA256, etc.
    4
    0 Votes
    4 Posts
    118 Views
    A1131A
    7731_found.txt 226336_left.zip
  • Forum Updates

    Announcements & Comments
    12
    0 Votes
    12 Posts
    2k Views
    cycloneC
    If you run into any issues logging into the forum, click the "login" URL from the front page at https://forum.hashpwn.net. Screenshot: [image: 1756917992032-27bf466f-c4be-436e-8eee-0659494ef8b8-image.png]
  • Definition of the hashing algorithm.

    Unknown Algo
    1
    0 Votes
    1 Posts
    261 Views
    No one has replied
  • 25 Hashes or Less Requests (Wireless)

    Pinned Wireless / WPA Cracking
    3
    1 Votes
    3 Posts
    312 Views
    D
    WPA*02*a56a203c044074b01ef40fcdbfdc8232*58fc201cb600*c0e7bfc63203*486f6d652044*520b12d18c65dcee67804a3698bd46abe8617ea5058e37a5922354fd645d329f*0103007502010a00000000000000000001df4875184311113de3a162fba55409a7ef447794414549a478ed744fd4e55c5e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001630140100000fac040100000fac040100000fac020000*82 Hi can you help me brute force this WPA please
  • Terms of Service & Privacy Policy

    Pinned Locked Forum Rules (MUST READ)
    1
    0 Votes
    1 Posts
    294 Views
    No one has replied
  • Import Hashcat Rules into John the Ripper

    John the Ripper
    2
    2 Votes
    2 Posts
    434 Views
    C
    I do it like this since I'm a windows user I go to cygwin64/home/pcname/JtR/run/rules Use e.g. best64.rule file Copy your hashcat rules to best64.rule file and save and you can run your hashcat rules from file best64.rule That way I don't have to edit my config file since I don't use JtR that often
  • 41M+ 40hex Hashes

    Standard: MD5, SHA1, SHA256, etc.
    1
    0 Votes
    1 Posts
    45 Views
    No one has replied
  • Hashcat Rules

    Hashcat Rules
    15
    0 Votes
    15 Posts
    2k Views
    A1131A
    Sorted by occurrence of rules file from online hashcat rules collection # ls a1131 blandyuk ciphers dive hybrid kaonashi MISC pantagrule robot t0xic top_n aon buka clem9669 fordy insidepro korelogic nsa-rules probable-wordlists shooter3k techtrip unicorn append cake dipepe hob0rules jabbercracky masks nyxgeek README.md skalman tmesis # find . -name "*.rule" | du -sh 860M . # du -sh ../collection.rule 372M ../collection.rule # wc -l ../collection.rule 26913875 ../collection.rule
  • 0 Votes
    2 Posts
    131 Views
    D
    A "clean one" I wean that not all third pepole have it. I had a couple but that was along time ago. So if you please. I will be thankful
  • jotti - VirusTotal Alternative

    Network & IP
    2
    1 Votes
    2 Posts
    370 Views
    cycloneC
    New release: v1.0.0; 2025-08-27 - stable v1.0.0 release - enforce Jotti's 250MB max file limit - added upload progress bar - added HTTP client timeout to avoid hangs - added non-zero exit on rate limit - tidied up logic in URL, filename, directory parsing
  • Wordlists

    Wordlists wordlist
    23
    4 Votes
    23 Posts
    2k Views
    A1131A
    Title: Cyrillic_wordlist Author: A1131 URL: Mega link Description:Wordlist for hashcracking The wordlist include passwords converted from Russian-Latin dictionaries to UTF-8 dvorak keyboard layout as well as extracted passwords in Russian Cyrillic from different dictionaries.
  • 0 Votes
    13 Posts
    732 Views
    174region1741
    aaNMONeH:Qqwe4566 ogv6TBFe:eyEmme0324
  • hashcat Info

    Pinned Locked hashcat
    2
    1 Votes
    2 Posts
    306 Views
    cycloneC
    update: hashcat v7.1.1 released https://github.com/hashcat/hashcat/releases/tag/v7.1.1 changelog: * changes v7.1.0 -> v7.1.1 ## ## Improvements ## Docker: Add initial support for AMD GPUs when running Hashcat inside Docker using HIP and OpenCL Hardware Monitor: Suppress fan speed warnings for unified memory setups (typically internal GPUs) Testing Framework: Enable hardware monitor to improve testing of memory-heavy algorithms Unit tests: Updated install_modules.sh to use an external module for Digest::MD6 ## ## Bugs ## - Fixed multi-hash handling in LUKS2 and KeePass (KDBX4), while single-hash remained unaffected * changes v7.0.0 -> v7.1.0 ## ## New Algorithms ## ## Endpoint - Added hash-mode: AS/400 DES - Added hash-mode: AS/400 SSHA1 - Added hash-mode: Blockchain, My Wallet, Legacy Wallets - Added hash-mode: Cisco-ISE Hashed Password (SHA256) - Added hash-mode: Keepass4 - Added hash-mode: SAP CODVN H (PWDSALTEDHASH) isSHA512 - Added hash-mode: sm3crypt $sm3$, SM3 (Unix) ## Primitives, KDFs, Libraries - Added hash-mode: BLAKE2b-256 - Added hash-mode: MD6 (256) ## Constructs - Added hash-mode: BLAKE2b-256($pass.$salt) - Added hash-mode: BLAKE2b-256($salt.$pass) - Added hash-mode: sha224($pass.$salt) - Added hash-mode: sha224($salt.$pass) - Added hash-mode: sha224(sha1($pass)) - Added hash-mode: sha224(sha224($pass)) ## ## Improvements ## - Attack-Modes: Use 64-bit counters for amplifier keyspace - Host Memory: Update method to query free host memory using /proc/meminfo when available - Docker: Add initial support for running hashcat inside Docker - Device Memory: Warn instead of waiting on high GPU memory usage - Backends: Enhanced AMD Windows OpenCL and HIP compatibility for legacy models - Rules: Add early syntax check for -j and -k rules - Device Memory: Do not disable hwmon interface by default in speed-only and progress-only mode - JSON output: Refactor Bridge unit reporting for clarity - Backends: Ignore devices from Microsoft OpenCL D3D12 platform - Building: Add MAINTAINER_MODE flag to disable hardcoded CPU optimization flags - Bash: Add missing parameters to bash completion script - Dependencies: Downgraded unrar source from 6.2.7 to 6.0.5 - Benchmark: Update default hash-mode selection - Libraries: DES and Blowfish restructure - Building: Add initial support for OpenBSD and DragonflyBSD ## ## Bugs ## - Fix broken JSON formatting when using the --status-json flag - Fix issue where -k single rules were ignored when used with -a 1 and -S ## ## Python Bridge ## - Fix unsalted hashlist support - Fix the esalt structure, it was too large - Improve support from 1:1 password-to-hash to 1:N password-to-hashes - Improve stand-alone debugging of Python Bridge stubs - Improve salt/esalt debugging of Python Bridge stubs - Enable potfile output by default for -m 73000 and 72000 ## ## Other changes ## - Argon2: Add argon2_init() wrappers to support private address space - Change hash-category for hash-modes 25600, 25800, 28400 and 30600 to HASH_CATEGORY_RAW_HASH_SALTED - Suppress optimization advice in final approach mode - Backend: Split backend_session_begin() into smaller compute-runtime specific functions - Sanity check: Abort if a custom-charset is defined on the command line and a mask file is used - Building: Disable Argon2 optimized path on RISC-V - Shared: improved 32-bit and 64-bit add and multiply overflow helper functions
  • mdxfind info

    Pinned Locked mdxfind
    4
    2 Votes
    4 Posts
    321 Views
    cycloneC
    update: mdxfind-1.130-2025-08-19 https://www.techsolvency.com/pub/bin/mdxfind/
  • 0 Votes
    9 Posts
    538 Views
    C
    found_119.txt left_2812.txt
  • 12m md5 (hex32) dump

    Standard: MD5, SHA1, SHA256, etc.
    14
    0 Votes
    14 Posts
    822 Views
    A1131A
    190897_found.zip 11393917_left

Who's Online [Full List]

4 users active right now (1 members and 3 guests).
hashpwn-bot

Board Statistics

Our members have made a total of 4.0k posts in 150 topics.
We currently have 260 members registered.
Please welcome our newest member, iceman.
The most users online at one time was 49 on Thursday, December 26, 2024.