Skip to content
  • Emails rules extractor

    Scripts
    1
    0 Votes
    1 Posts
    148 Views
    No one has replied
  • 0 Votes
    8 Posts
    494 Views
    cycloneC
    You can submit a support ticket on hashes.com and ask them to add support for the latest hashcat 26600 and 26610 algos that were released with hashcat v7. https://hashes.com/en/support
  • 809k -m 1420 sha256($salt.$pass)

    Standard: MD5, SHA1, SHA256, etc.
    3
    0 Votes
    3 Posts
    268 Views
    A1131A
    3395_found.txt 710506_left.zip
  • DEFCON Jabbercracky

    Contest / CTF
    2
    3 Votes
    2 Posts
    592 Views
    cycloneC
    Great game to all who played on both Competitive and Casual, and congrats to team hashcat for 1st place, team hashmob for a close 2nd in the Competitive class. https://defcon.jabbercracky.com/ Competitive leaderboard: [image: 1754853029372-5f69874d-0975-44b9-952f-8cca315ae43d-image-resized.png] Competitive graph: [image: 1754853053767-403ff692-0a1c-4ed4-8894-774bf4f73b93-image-resized.png]
  • 2,7kk+ 32hex Hashes

    Standard: MD5, SHA1, SHA256, etc.
    17
    0 Votes
    17 Posts
    858 Views
    S
    -m 3315_found 3315_found.txt https://gofile.io/d/tNDJe4 left
  • 1,3M+ vBulletin Hashes

    Forum: IPB, vBulletin, SMF, phpBB3, MyBB, etc.
    7
    0 Votes
    7 Posts
    667 Views
    N
    7220_found.txt 1015924_left.7z
  • hashcat GPU benchmarks

    General Discussion
    14
    0 Votes
    14 Posts
    1k Views
    cycloneC
    hashcat v7.0.0+4.2 benchmark (updated 2025/08/02@16:25) # gpu: nvidia rtx 4090 # manufacture: msi # model: suprim liquid x # settings: 450w stock settings # vbios: 95.02.18.00.52 # 08/02/2025 # NVIDIA-SMI 575.57.08 # CUDA Version: 12.9.1 # hashcat (v7.0.0+4.2) ./hashcat.bin -b hashcat (v7.0.0-4-g9727714cf) starting in benchmark mode Benchmarking uses hand-optimized kernel code by default. You can use it in your cracking session by setting the -O option. Note: Using optimized kernel code limits the maximum supported password length. To disable the optimized kernel code in benchmark mode, use the -w option. Initializing bridges. Please be patient...Initialized bridgesInitializing backend runtimes. Please be patient...Initialized backend runtimesInitializing backend devices. Please be patient...Initialized backend devicesCUDA API (CUDA 12.9) ==================== * Device #01: NVIDIA GeForce RTX 4090, 23688/24080 MB, 128MCU OpenCL API (OpenCL 3.0 CUDA 12.9.76) - Platform #1 [NVIDIA Corporation] ======================================================================= * Device #02: NVIDIA GeForce RTX 4090, skipped Benchmark relevant options: =========================== * --backend-devices=2 * --backend-devices-virtmulti=1 * --backend-devices-virthost=1 * --optimized-kernel-enable ------------------- * Hash-Mode 0 (MD5) ------------------- Speed.#01........: 164.2 GH/s (90.81ms) @ Accel:128 Loops:1024 Thr:896 Vec:8 ---------------------- * Hash-Mode 100 (SHA1) ---------------------- Speed.#01........: 58208.9 MH/s (73.51ms) @ Accel:64 Loops:1024 Thr:512 Vec:1 --------------------------- * Hash-Mode 1400 (SHA2-256) --------------------------- Speed.#01........: 21947.7 MH/s (91.50ms) @ Accel:15 Loops:1024 Thr:1024 Vec:4 --------------------------- * Hash-Mode 1700 (SHA2-512) --------------------------- Speed.#01........: 7476.6 MH/s (89.57ms) @ Accel:8 Loops:1024 Thr:640 Vec:1 ------------------------------------------------------------- * Hash-Mode 22000 (WPA-PBKDF2-PMKID+EAPOL) [Iterations: 4095] ------------------------------------------------------------- Speed.#01........: 2574.3 kH/s (88.52ms) @ Accel:7 Loops:1024 Thr:1024 Vec:1 ----------------------- * Hash-Mode 1000 (NTLM) ----------------------- Speed.#01........: 284.1 GH/s (73.54ms) @ Accel:192 Loops:1024 Thr:896 Vec:8 --------------------- * Hash-Mode 3000 (LM) --------------------- Speed.#01........: 155.7 GH/s (95.78ms) @ Accel:448 Loops:1024 Thr:256 Vec:1 -------------------------------------------- * Hash-Mode 5500 (NetNTLMv1 / NetNTLMv1+ESS) -------------------------------------------- Speed.#01........: 158.2 GH/s (77.39ms) @ Accel:96 Loops:1024 Thr:1024 Vec:1 ---------------------------- * Hash-Mode 5600 (NetNTLMv2) ---------------------------- Speed.#01........: 11696.0 MH/s (89.49ms) @ Accel:8 Loops:1024 Thr:1024 Vec:1 -------------------------------------------------------- * Hash-Mode 1500 (descrypt, DES (Unix), Traditional DES) -------------------------------------------------------- Speed.#01........: 6321.6 MH/s (84.67ms) @ Accel:4 Loops:1024 Thr:1024 Vec:1 ------------------------------------------------------------------------------ * Hash-Mode 500 (md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)) [Iterations: 1000] ------------------------------------------------------------------------------ Speed.#01........: 70840.0 kH/s (96.54ms) @ Accel:56 Loops:1000 Thr:1024 Vec:1 ---------------------------------------------------------------- * Hash-Mode 3200 (bcrypt $2*$, Blowfish (Unix)) [Iterations: 32] ---------------------------------------------------------------- Speed.#01........: 248.8 kH/s (95.61ms) @ Accel:8 Loops:32 Thr:24 Vec:1 -------------------------------------------------------------------- * Hash-Mode 1800 (sha512crypt $6$, SHA512 (Unix)) [Iterations: 5000] -------------------------------------------------------------------- Speed.#01........: 1210.2 kH/s (85.52ms) @ Accel:4 Loops:1000 Thr:1024 Vec:1 -------------------------------------------------------- * Hash-Mode 7500 (Kerberos 5, etype 23, AS-REQ Pre-Auth) -------------------------------------------------------- Speed.#01........: 3642.8 MH/s (95.91ms) @ Accel:334 Loops:256 Thr:32 Vec:1 ------------------------------------------------- * Hash-Mode 13100 (Kerberos 5, etype 23, TGS-REP) ------------------------------------------------- Speed.#01........: 3551.8 MH/s (96.00ms) @ Accel:326 Loops:256 Thr:32 Vec:1 --------------------------------------------------------------------------------- * Hash-Mode 15300 (DPAPI masterkey file v1 (context 1 and 2)) [Iterations: 23999] --------------------------------------------------------------------------------- Speed.#01........: 463.4 kH/s (82.19ms) @ Accel:7 Loops:1000 Thr:1024 Vec:1 --------------------------------------------------------------------------------- * Hash-Mode 15900 (DPAPI masterkey file v2 (context 1 and 2)) [Iterations: 12899] --------------------------------------------------------------------------------- Speed.#01........: 262.2 kH/s (76.61ms) @ Accel:4 Loops:512 Thr:1024 Vec:1 ------------------------------------------------------------------ * Hash-Mode 7100 (macOS v10.8+ (PBKDF2-SHA512)) [Iterations: 1023] ------------------------------------------------------------------ Speed.#01........: 3273.1 kH/s (79.01ms) @ Accel:4 Loops:512 Thr:1024 Vec:1 --------------------------------------------- * Hash-Mode 11600 (7-Zip) [Iterations: 16384] --------------------------------------------- Speed.#01........: 2231.6 kH/s (91.80ms) @ Accel:17 Loops:4096 Thr:512 Vec:1 ------------------------------------------------ * Hash-Mode 12500 (RAR3-hp) [Iterations: 262144] ------------------------------------------------ Speed.#01........: 287.1 kH/s (71.10ms) @ Accel:5 Loops:16384 Thr:512 Vec:1 -------------------------------------------- * Hash-Mode 13000 (RAR5) [Iterations: 32799] -------------------------------------------- Speed.#01........: 278.7 kH/s (85.27ms) @ Accel:12 Loops:1024 Thr:512 Vec:1 -------------------------------------------------------------------------------- * Hash-Mode 6211 (TrueCrypt RIPEMD160 + XTS 512 bit (legacy)) [Iterations: 1999] -------------------------------------------------------------------------------- Speed.#01........: 1989.6 kH/s (90.02ms) @ Accel:6 Loops:500 Thr:1024 Vec:1 ----------------------------------------------------------------------------------- * Hash-Mode 13400 (KeePass 1 (AES/Twofish) and KeePass 2 (AES)) [Iterations: 24569] ----------------------------------------------------------------------------------- Speed.#01........: 332.1 kH/s (82.05ms) @ Accel:10 Loops:1024 Thr:512 Vec:1 ------------------------------------------------------------------- * Hash-Mode 6800 (LastPass + LastPass sniffed) [Iterations: 100099] ------------------------------------------------------------------- Speed.#01........: 92374 H/s (86.89ms) @ Accel:8 Loops:1024 Thr:768 Vec:1 -------------------------------------------------------------------- * Hash-Mode 11300 (Bitcoin/Litecoin wallet.dat) [Iterations: 200459] -------------------------------------------------------------------- Speed.#01........: 34141 H/s (78.29ms) @ Accel:4 Loops:1024 Thr:1024 Vec:1 Started: Sat Aug 2 16:11:47 2025 Stopped: Sat Aug 2 16:19:10 2025
  • Hashcat benchmark comparator

    hashcat
    1
    0 Votes
    1 Posts
    207 Views
    No one has replied
  • hashcat-6.2.6+1550 - beta

    hashcat
    3
    0 Votes
    3 Posts
    219 Views
    cycloneC
    There have been a lot of PR's merged since May 2025 and several beta's since then, so a bit hard to keep up with everything since there hasn't yet been an official list of updates published on hashcat.net. You can always compare the recent comments on github to see what's getting updated in the code base. Below are a few files / directories to monitor comments on to see what's been getting added, changed, or removed. https://github.com/hashcat/hashcat/blob/master/docs/changes.txt https://github.com/hashcat/hashcat/commits/master/ https://github.com/hashcat/hashcat/commits/master/src/modules https://github.com/hashcat/hashcat/commits/master/OpenCL
  • solflare_pwn - Solflare Vault Extractor & Decryptor

    Hash Cracking
    13
    2 Votes
    13 Posts
    796 Views
    cycloneC
    @Senses DM me on Matrix.
  • atomic_pwn - Atomic Vault Extractor & Decryptor

    Hash Cracking
    8
    1 Votes
    8 Posts
    835 Views
    J
    I have the files from Storage\leveldb\ i cant find the Mnemonic key hash from extractor ? can you help me please ?!!!
  • 0 Votes
    6 Posts
    437 Views
    F
    @potato100500 How did you extract vault data, which file you used? I checked one of trustwallet .ldb and found other vault format. It differ from one you posted in your script.
  • Pro Tips

    Pinned Resources jtr
    13
    4 Votes
    13 Posts
    957 Views
    freerouteF
    Title: Plundering and pillaging password and passphrase plains for profit Author: Will Hunt Description: In this talk we'll look beyond the basics of cracking and arm you with further attacks when you feel you're out of options. We'll look at multiple paths for cracking delimited passphrases and review when you'd want to use these attacks and why. Target-specific markov tables will be shown to illustrate how you could be missing out on elusive plains without even realising it, as well as getting the best bang for your buck out of your rule-based attacks by identifying non-efficient operations. Then, after reviewing transliterated attacks and hash shucking, we'll wrap up with the release of a tool to help you automate the initial heavy lifting of your attack cycles. Will Hunt Will (@Stealthsploit) has been in infosec for over 15 years, co-founded In.security in 2018 and as a pentester has helped secure many organisations through technical security services and training. Will's a Black Hat trainer and has taught and spoken at several conferences and events, as well as helping run Password Village at DEFCON. Will also assists the UK government in various technical, educational and advisory capacities. Before Will was a security consultant he was an experienced digital forensics consultant and trainer. Security Fest is an inspiring and unique IT security conference held in Gothenburg, Sweden. The event is an excellent opportunity to learn more about IT security, and a great way to connect with both the renowned international speakers, and the other attendees. Source: https://www.youtube.com/watch?v=ArLhwcpWMdU
  • Daedalus

    hashcat
    1
    0 Votes
    1 Posts
    306 Views
    No one has replied
  • CMIYC 2025

    Contest / CTF
    2
    1
    0 Votes
    2 Posts
    402 Views
    cycloneC
    Update Jabbercracky DEF CON 2025: https://forum.hashpwn.net/post/793
  • TRONLINK

    hashcat
    1
    0 Votes
    1 Posts
    276 Views
    No one has replied
  • 1 Votes
    4 Posts
    624 Views
    H
    $metamask$CV/Ryf8AkERc95iM8WSDdvEK/81ptvzHNLu0PcOMDgw=$S6FPEhQiagInyWPrkBVuMA==$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
  • 3,7M+ vBulletin Hashes

    Forum: IPB, vBulletin, SMF, phpBB3, MyBB, etc.
    5
    0 Votes
    5 Posts
    501 Views
    N
    3050_found.txt 1997750_left.7z
  • 194k SHA512

    Standard: MD5, SHA1, SHA256, etc.
    11
    0 Votes
    11 Posts
    722 Views
    N
    350_found.txt 172152_left.7z
  • 3,5M+ MD5 Hashes

    Standard: MD5, SHA1, SHA256, etc.
    7
    0 Votes
    7 Posts
    520 Views
    A1131A
    1080_m2611_found.txt 60914_m0_found.txt 2672724_left.txt

Who's Online [Full List]

5 users active right now (3 members and 2 guests).
cyclone, hashpwn-bot

Board Statistics

Our members have made a total of 4.0k posts in 150 topics.
We currently have 260 members registered.
Please welcome our newest member, iceman.
The most users online at one time was 49 on Thursday, December 26, 2024.