Skip to content
  • Hashes.com Escrow Feed

    Pinned Locked Moved Resources
    7k
    1 Votes
    7k Posts
    86k Views
    hashpwn-botH
    Escrow ID# 83034 • Algorithm: MD5, -m 0 • Total hashes: 1 • Price per hash: $1.0496 • Escrow URL: https://hashes.com/en/escrow/item/?id=83034 • Download hashes: 83034_0.zip
  • 0 Votes
    2 Posts
    41 Views
    cycloneC
    Answered on your other post: https://forum.hashpwn.net/post/8383
  • 0 Votes
    12 Posts
    832 Views
    cycloneC
    It is better to use hashcat to recover the wallet password, then use metamask_decryptor to recover the seed phrase. If you're having issues with getting hashcat to work, make sure to use metamask_extractor to properly extract the hash. Several users have run into issues getting hashcat and metamask hashes to work on Windows, so trying yours with hashcat on linux is worth a shot. I have hashcat with my custom 26620 metamask kernel hosted on github which is compatible with the metamask_extractor. https://github.com/cyclone-github/hashcat
  • Forum Updates

    Announcements & Comments
    22
    0 Votes
    22 Posts
    4k Views
    cycloneC
    Happy New Year, hashpwn! We wrapped up our first full year in 2025 and had a lot of fun along the way. Last month (Dec) was our highest traffic month to date, driven by the 12 Days of Christmas Challenge. A big thank you to everyone who has been part of the community, and to our staff who helped turn an idea into a reality. Here's to 2026! ~ @cyclone Current Stats Members: 331 Posts: 8.2k December 2025 Highlights Page Views: 2,637,674 Unique Visitors: 162,321 New Users: 22 Posts: 1,402 Data Served: 252 GB Uptime 24h: 100% 30d: 99.96% 1y: 99.90% Forum Traffic - 2025 [image: 1767319830465-8dab8623-5cdd-4410-8e6b-47f9969e248e-image.png]
  • Infosec News

    General Discussion
    104
    1
    1 Votes
    104 Posts
    26k Views
    cycloneC
    2025 Cybersecurity Predictions vs Reality [image: 1767317893227-3c1560c3-d3d5-46e7-a3c1-06e89c44471b-image.png] This article reviews 90+ predictions from 36 cybersecurity experts and compares them to what actually occurred in 2025. The main finding: most predictions were accurate, especially those focused on AI amplifying existing threats rather than creating new ones. Key Outcomes AI Amplified Existing Attacks AI was widely adopted by attackers to scale and automate known techniques. Observed uses included AI-assisted phishing, automated recon, and malware with runtime code mutation to evade detection. Underground markets began selling configurable AI-powered attack tools. AI reduced the skill barrier and increased attack speed and volume. Result: Prediction confirmed. AI increased efficiency, not novelty. SaaS, Cloud, and Identity Became the Main Attack Surface SaaS misconfigurations, excessive permissions, insecure APIs, and third-party integrations were major breach drivers. Identity and access failures eclipsed traditional perimeter security issues. Large-scale cloud outages were often caused by configuration errors. Result: Prediction confirmed. Identity and SaaS security became critical weaknesses. Ransomware Fragmented Further Law enforcement pressure led to more, smaller ransomware groups rather than fewer. 30 to 40 percent increase in active ransomware operators. Affiliates increasingly moved between groups, complicating attribution. Result: Prediction confirmed. Ransomware evolved into a fragmented ecosystem. Supply Chain Attacks Increased Enterprises were compromised through trusted vendors and enterprise software. SaaS and third-party providers became common initial access vectors. Result: Prediction confirmed. Vendor risk became a primary concern. Data Became the Core Security Asset Data protection and governance overtook infrastructure as the main security focus. Large credential leaks and AI training on sensitive data accelerated this shift. Data visibility and classification became prerequisites for AI use. Result: Prediction confirmed. Data security underpins most modern risks. Regulation Added Complexity Without Reducing Attacks Increased compliance and reporting requirements did not deter attackers. Regulatory burden primarily impacted internal operations, not threat actors. Result: Prediction confirmed. Regulation did not materially change the threat landscape. Bottom Line 2025 validated long-standing warnings rather than introducing new threat classes. The biggest risks were known problems amplified by AI, automation, and scale, not futuristic scenarios. Source: https://cybernews.com/news/did-cybersecurity-expert-predictions-2025-come-true/
  • crackmon - Monitor hashcat / mdxfind crackrate

    Hash Cracking
    13
    2 Votes
    13 Posts
    2k Views
    T
    @freeroute Is it compatible with Ubuntu? Could you share a download link?
  • hashpwn wordlist

    Pinned Wordlists
    10
    6 Votes
    10 Posts
    3k Views
    cycloneC
    hashpwn-2025-12-12 is available for download and includes all founds submitted to forum.hashpwn.net from Oct 2024 - Dec 2025. Originally announced here: https://forum.hashpwn.net/post/4844
  • The Twelve Days of Christmas 2025 Challenge - Double Time

    Moved Contest / CTF
    51
    1 Votes
    51 Posts
    2k Views
    cycloneC
    Challenge Submission Results: Note, a couple users dup submitted on a few challenges by using different IP addresses. Other than having their username listed twice under "Submissions", there was no other affect to the outcome of the challenges. [image: 1766877679827-4e4148b0-d888-41a8-a127-9c82da28d70d-image.png] [image: 1766877702333-368a2e83-9f2a-49e0-9288-f5a99d769a1b-image.png] [image: 1766877719237-22baff5e-910f-42d6-afec-1eadde4b2def-image.png] [image: 1766877739275-f7631ead-784f-498c-96b8-1ed683e83456-image.png] [image: 1766877765661-d11ce807-a2be-469c-abb7-2dab04e7b5e0-image.png] [image: 1766877794960-da2e5535-c55b-40c7-8035-68fc50b8fb1a-image.png] [image: 1766877809068-8bf88cc1-86a9-4345-a833-f3fea629f52d-image.png] [image: 1766877824618-1417d1db-a81d-4b9a-b43b-bc1ffded77a5-image.png] [image: 1766877838552-32c1eb77-71c2-4bad-8da9-a29ee6456c16-image.png] [image: 1766877859939-48304402-822f-48c6-9a94-04961d58f985-image.png] [image: 1766877875284-f7ce3fb8-b300-4877-bbff-3d64a73e11be-image.png] [image: 1766877888849-c200760f-257e-4fe8-9b5e-e88b23659b70-image.png] The Grand Prize, aka the hidden Challenge 13, was figured out and claimed by @_cin
  • 1922 sha256(md5($salt.$pass))

    Standard: MD5, SHA1, SHA256, etc.
    3
    0 Votes
    3 Posts
    370 Views
    C
    115_found / 1590_left found 128 more using "RS" salt only can't say if they are valid and are not withdrawn from the left list 115_found.txt 128_found_RS-salt.txt 1590_left.txt
  • Hashcat GUI with hashes.com escrow integration

    HashcatGUI
    15
    4
    0 Votes
    15 Posts
    916 Views
    S
    New update V-1.0.5 Improvements in insight section like cost calculation with multi currency support, semantic analysis, algo efficiency comparison, Reports generation and PRINCE wordlist generator Added additional options in configuration section. Now the application supports hashcat CLI commands like c(checkpoint), s(status update), b(bypass) Minor bug fixes. https://github.com/jjsvs/Hashcat-Reactor/releases/tag/V-1.0.5 [image: 1766743249406-screenshot-36-resized.png] [image: 1766743249598-screenshot-37-resized.png] [image: 1766743249785-screenshot-38-resized.png] [image: 1766743249988-screenshot-39-resized.png] [image: 1766743250232-screenshot-40-resized.png]
  • 1 Votes
    6 Posts
    1k Views
    C
    $1$syKhuaO/$lKIJVzM35M0rO2gbClwED0
  • Language Specific Wordlists

    Pinned Wordlists
    8
    0 Votes
    8 Posts
    417 Views
    174region1741
    @cyclone I just provided hacking masks. I don't need to hack any of this.
  • Wordlists

    Wordlists wordlist
    26
    4 Votes
    26 Posts
    5k Views
    A1131A
    Unfortunately not, it's just for cracking standard hashes and hashed email addresses.
  • 12m md5 (hex32) dump

    Standard: MD5, SHA1, SHA256, etc.
    17
    0 Votes
    17 Posts
    3k Views
    A1131A
    34420_found.txt 11282004_left
  • Spider - Web Crawler and Wordlist / Ngram Generator

    Network & IP
    4
    3 Votes
    4 Posts
    1k Views
    cycloneC
    v0.9.1 https://github.com/cyclone-github/spider/releases/tag/v0.9.1 added -agent flag #8 by @cyclone-github in #10 chore(deps): enable daily Dependabot for Go modules by @cyclone-github in #11 ci: build/test Dependabot PRs by @cyclone-github in #12 chore(deps): bump github.com/PuerkitoBio/goquery from 1.10.3 to 1.11.0 in the minor-and-patch group by @dependabot[bot] in #13
  • 25 Hashes or Less Requests (Wireless)

    Pinned Wireless / WPA Cracking
    12
    1 Votes
    12 Posts
    2k Views
    T
    ESSID: 304 BSSID: 20:FF:36:95:59:2A Attempts already made: none 1wpa.zip
  • WPA Keygen List

    Hash Cracking
    2
    1 Votes
    2 Posts
    751 Views
    T
    Do you have a WPA key generator for TP-LINK-XXXX routers?
  • 37 x WPA handshake

    Wireless / WPA Cracking
    8
    0 Votes
    8 Posts
    723 Views
    T
    ESSID:yematech-613_5G has been cracked
  • Concentrator - Unified Hashcat Rule Processor

    Scripts
    1
    0 Votes
    1 Posts
    441 Views
    No one has replied
  • 3,5M+ MD5 Hashes

    Standard: MD5, SHA1, SHA256, etc.
    10
    0 Votes
    10 Posts
    2k Views
    A1131A
    4323_found.txt 2637491_left.zip

Who's Online [Full List]

13 users active right now (2 members and 11 guests).
hashpwn-bot, segfault

Board Statistics

Our members have made a total of 8.5k posts in 167 topics.
We currently have 338 members registered.
Please welcome our newest member, segfault.
The most users online at one time was 49 on Thursday, December 26, 2024.