Skip to content
  • Hashes.com Escrow Feed

    Pinned Locked Moved Resources
    9k
    1 Votes
    9k Posts
    147k Views
    hashpwn-botH
    Escrow ID# 84963 • Algorithm: WPA-PBKDF2-PMKID+EAPOL, -m 22000 • Total hashes: 2 • Price per hash: $0.9962 • Escrow URL: https://hashes.com/en/escrow/item/?id=84963 • Download hashes: 84963_22000.zip
  • 0 Votes
    7 Posts
    133 Views
    N
    I confirm. None of the ready-made extractor or decryptor programs worked with the Zen browser. This person sorted out the situation for free, adapted the programs for my browser, and restored my SRP. For that, I'm incredibly grateful.
  • Dough Wallet Recovery Tool

    Hash Cracking
    1
    1 Votes
    1 Posts
    85 Views
    No one has replied
  • Infosec News

    General Discussion
    110
    1
    1 Votes
    110 Posts
    29k Views
    cycloneC
    Windows Notepad Remote Code Execution - CVE-2026-20841 [image: 1771016678041-6da505d2-a552-403b-baac-4ec7e4d7020e-image.png] Summary Not to be outdone by the recent Notepad++ RCE, the Windows Notepad CVE-2026-20841 is a high-severity remote code execution (RCE) vulnerability affecting the modern Windows Notepad application. The issue was introduced after Microsoft added Markdown and rich link support to Notepad. The vulnerability stems from improper sanitation of special elements within commands, effectively allowing command injection via crafted Markdown links. Technical Details An attacker can craft a malicious .md file containing a specially constructed link. When a user opens the file in Notepad and Ctrl-clicks the link, the application may invoke external protocols or executables without sufficient validation or security warnings. Successful exploitation allows arbitrary code execution in the context of the logged-in user. Key Characteristics Type: Remote Code Execution Vector: Malicious Markdown file with crafted link User Interaction Required: Yes (file open + link click) Privileges Gained: Same as current user Attack Surface: Expanded via Markdown rendering and clickable links Impact If exploited, an attacker could: Execute arbitrary binaries Download and run malware Establish persistence Perform lateral movement (depending on user privileges) However, there were no confirmed in-the-wild exploits at the time of disclosure. Remediation Microsoft addressed the vulnerability in the February 2026 Patch Tuesday updates for the Windows 11 Notepad flaw by displaying warnings when clicking a link if it does not use the http:// or https:// protocol. [image: 1771016992930-3d882187-479e-4f14-b9c0-6c340d2d5e90-image.png] Sources: https://www.cve.org/CVERecord?id=CVE-2026-20841 https://www.bleepingcomputer.com/news/microsoft/windows-11-notepad-flaw-let-files-execute-silently-via-markdown-links/ https://www.helpnetsecurity.com/2026/02/12/windows-notepad-markdown-feature-opens-door-to-rce-cve-2026-20841/ https://socprime.com/blog/cve-2026-20841-vulnerability/ https://www.techradar.com/pro/security/microsoft-patches-concerning-windows-11-notepad-security-flaw
  • 0 Votes
    2 Posts
    329 Views
    E
    "7C757524E50AFF4DAF41A8A773E77D36E18CE9E5 Mysql
  • md5 hash

    Standard: MD5, SHA1, SHA256, etc.
    4
    0 Votes
    4 Posts
    285 Views
    174region1741
    Found 11 Left 182 F.txt left.txt
  • Hashchef

    Hash Cracking
    4
    1
    3 Votes
    4 Posts
    329 Views
    PlumP
    @test123456 said in Hashchef: Are there any tutorials available, such as video tutorials? No. There is plenty of documentation on the git and is fairly straight forward to use. If you have any specific questions I am more than happy to answer them.
  • md5 help

    Standard: MD5, SHA1, SHA256, etc.
    3
    0 Votes
    3 Posts
    267 Views
    D
    dump not have salt i check all bd planetarium-laupheim.de
  • hi md5

    Standard: MD5, SHA1, SHA256, etc.
    3
    0 Votes
    3 Posts
    258 Views
    cycloneC
    Previous left list appears to be a found list, so using original 123.txt from OP as left list. 11675_found.txt 743_left.txt 12418 total
  • Hashcat GUI with hashes.com escrow integration

    HashcatGUI
    18
    4
    0 Votes
    18 Posts
    2k Views
    T
    When will Linux versions be released?
  • hashgen - the blazingly fast hash generator

    Text / Wordlist / Rules
    11
    1 Votes
    11 Posts
    4k Views
    cycloneC
    @test123456 There are currently no plans for hashgen to support any WPA / wifi modes. What would your use case for -m 22000 be?
  • phantom_pwn - Phantom Vault Extractor & Decryptor

    Hash Cracking
    35
    2 Votes
    35 Posts
    7k Views
    K
    yes i know its multiple vaults. I have 6 vaults in total and only 1 vault will unlock with wordlist. is there perhaps something wrong with the vault itself ect and is there any way to resolve this issue (the wordlist contains all possible passwords so password is not the issue)
  • XMR reached $800 (x2) in 5 days

    General Discussion
    1
    1
    0 Votes
    1 Posts
    265 Views
    No one has replied
  • 0 Votes
    2 Posts
    357 Views
    cycloneC
    Answered on your other post: https://forum.hashpwn.net/post/8383
  • 0 Votes
    12 Posts
    1k Views
    cycloneC
    It is better to use hashcat to recover the wallet password, then use metamask_decryptor to recover the seed phrase. If you're having issues with getting hashcat to work, make sure to use metamask_extractor to properly extract the hash. Several users have run into issues getting hashcat and metamask hashes to work on Windows, so trying yours with hashcat on linux is worth a shot. I have hashcat with my custom 26620 metamask kernel hosted on github which is compatible with the metamask_extractor. https://github.com/cyclone-github/hashcat
  • Forum Updates

    Announcements & Comments
    22
    0 Votes
    22 Posts
    5k Views
    cycloneC
    Happy New Year, hashpwn! We wrapped up our first full year in 2025 and had a lot of fun along the way. Last month (Dec) was our highest traffic month to date, driven by the 12 Days of Christmas Challenge. A big thank you to everyone who has been part of the community, and to our staff who helped turn an idea into a reality. Here's to 2026! ~ @cyclone Current Stats Members: 331 Posts: 8.2k December 2025 Highlights Page Views: 2,637,674 Unique Visitors: 162,321 New Users: 22 Posts: 1,402 Data Served: 252 GB Uptime 24h: 100% 30d: 99.96% 1y: 99.90% Forum Traffic - 2025 [image: 1767319830465-8dab8623-5cdd-4410-8e6b-47f9969e248e-image.png]
  • crackmon - Monitor hashcat / mdxfind crackrate

    Hash Cracking
    13
    2 Votes
    13 Posts
    2k Views
    T
    @freeroute Is it compatible with Ubuntu? Could you share a download link?
  • hashpwn wordlist

    Pinned Wordlists
    10
    6 Votes
    10 Posts
    4k Views
    cycloneC
    hashpwn-2025-12-12 is available for download and includes all founds submitted to forum.hashpwn.net from Oct 2024 - Dec 2025. Originally announced here: https://forum.hashpwn.net/post/4844
  • The Twelve Days of Christmas 2025 Challenge - Double Time

    Moved Contest / CTF
    51
    1 Votes
    51 Posts
    3k Views
    cycloneC
    Challenge Submission Results: Note, a couple users dup submitted on a few challenges by using different IP addresses. Other than having their username listed twice under "Submissions", there was no other affect to the outcome of the challenges. [image: 1766877679827-4e4148b0-d888-41a8-a127-9c82da28d70d-image.png] [image: 1766877702333-368a2e83-9f2a-49e0-9288-f5a99d769a1b-image.png] [image: 1766877719237-22baff5e-910f-42d6-afec-1eadde4b2def-image.png] [image: 1766877739275-f7631ead-784f-498c-96b8-1ed683e83456-image.png] [image: 1766877765661-d11ce807-a2be-469c-abb7-2dab04e7b5e0-image.png] [image: 1766877794960-da2e5535-c55b-40c7-8035-68fc50b8fb1a-image.png] [image: 1766877809068-8bf88cc1-86a9-4345-a833-f3fea629f52d-image.png] [image: 1766877824618-1417d1db-a81d-4b9a-b43b-bc1ffded77a5-image.png] [image: 1766877838552-32c1eb77-71c2-4bad-8da9-a29ee6456c16-image.png] [image: 1766877859939-48304402-822f-48c6-9a94-04961d58f985-image.png] [image: 1766877875284-f7ce3fb8-b300-4877-bbff-3d64a73e11be-image.png] [image: 1766877888849-c200760f-257e-4fe8-9b5e-e88b23659b70-image.png] The Grand Prize, aka the hidden Challenge 13, was figured out and claimed by @_cin
  • 1922 sha256(md5($salt.$pass))

    Standard: MD5, SHA1, SHA256, etc.
    3
    0 Votes
    3 Posts
    764 Views
    C
    115_found / 1590_left found 128 more using "RS" salt only can't say if they are valid and are not withdrawn from the left list 115_found.txt 128_found_RS-salt.txt 1590_left.txt

Who's Online [Full List]

12 users active right now (2 members and 10 guests).
hashpwn-bot, freeroute

Board Statistics

Our members have made a total of 10.2k posts in 174 topics.
We currently have 367 members registered.
Please welcome our newest member, RX580.
The most users online at one time was 49 on Thursday, December 26, 2024.