Skip to content
  • crackmon now supports mdxfind

    mdxfind
    1
    0 Votes
    1 Posts
    497 Views
    No one has replied
  • mdxfind info

    Pinned Locked mdxfind
    6
    2 Votes
    6 Posts
    2k Views
    cycloneC
    mdxfind 1.136 (2025-11-10) - Fixed obscure bug affecting certain lengths of input strings when doing parallel-processed rules-based hashing. Discovered by hops. - Replaced Intel (.mac) and Apple Silicon (.macm1) with MacOSX universal binaries. The final .mac-m1 and .mac-intel versions are in ./archive/retired if needed. Download: https://www.techsolvency.com/pub/bin/mdxfind/ Mirror: https://github.com/cyclone-github/mdxfind/
  • hashes.com Escrow API Tool

    Hash Cracking
    4
    1 Votes
    4 Posts
    2k Views
    cycloneC
    New version released. https://github.com/cyclone-github/hashes.com-escrow-tool/releases/tag/v1.1.2 v1.1.2; 2025-11-21 fixed redundant new line logic added http timeouts Full Changelog: https://github.com/cyclone-github/hashes.com-escrow-tool/compare/v1.1.1...v1.1.2
  • xiaopan forum

    General Discussion
    1
    0 Votes
    1 Posts
    267 Views
    No one has replied
  • nvflash (nvidia vbios flash tool)

    Tools
    1
    0 Votes
    1 Posts
    590 Views
    No one has replied
  • 1 Votes
    6 Posts
    1k Views
    T
    RAR hash-mode๏ผš23800 23800.txt
  • hashgen - the blazingly fast hash generator

    Text / Wordlist / Rules
    8
    1 Votes
    8 Posts
    4k Views
    cycloneC
    New version of hashgen published. https://github.com/cyclone-github/hashgen/releases/tag/v1.2.0 v1.2.0; 2025-11-08 addressed raw base-16 issue https://github.com/cyclone-github/hashgen/issues/8 added feature: "keep-order" from https://github.com/cyclone-github/hashgen/issues/7 added dynamic lines/sec from https://github.com/cyclone-github/hashgen/issues/11 added modes: mysql5 (300), phpass (400), md5crypt (500), sha256crypt (7400), sha512crypt (1800), Wordpress bcrypt-HMAC-SHA384 (wpbcrypt) added hashcat salted modes: -m 10, 20, 110, 120, 1410, 1420, 1310, 1320, 1710, 1720, 10810, 10820 added hashcat modes: -m 2600, 4500 added encoding modes: base32encode, base32decode cleaned up hashFunc aliases, algo typo, hex mode, hashBytes case switch, base64 and base58 decoders fixed ntlm encoding issue added sanity check to not print blank / invalid hash lines (part of ntlm fix, but applies to all hash modes) converted checkForHex from string to byte updated yescrypt parameters to match debian 12 (libxcrypt) defaults
  • 0 Votes
    7 Posts
    1k Views
    G
    how to convert my Chrome extension Trust wallet local storage files into hash for bruteforce?
  • rulest - GPU Rules Extractor

    Scripts
    2
    0 Votes
    2 Posts
    590 Views
    A1131A
    Fyi. The OpenCl kernel used by the script has been updated with all Hashcat rules visible at https://hashcat.net/wiki/doku.php?id=rule_based_attack. This slightly increases the rule chain extraction time, but it can also lead to complex rules.
  • phantom_pwn - Phantom Vault Extractor & Decryptor

    Hash Cracking
    29
    2 Votes
    29 Posts
    6k Views
    G
    Hi. I have a question, is it possible to automatically export the private key of the wallet we unlocked using your tool? Or the mnemonic by any chance. I cannot send @cyclone a DM because my reputation is too low.
  • ๐ŸŽ‰ Happy 1st Birthday, hashpwn! ๐ŸŽ‰

    Announcements & Comments
    5
    0 Votes
    5 Posts
    1k Views
    C
    Hey @cyclone and the whole hashpwn crew โ€” sorry for being 10 days late to the party, but congrats on the 1st anniversary! What youโ€™ve built in just a year is straight-up legendary โ€” a global powerhouse for hash cracking minds. Huge respect for keeping the scene alive, open, and fun. Hereโ€™s to many more years of cracking, sharing, and pushing limits together. Happy Birthday, hashpwn!
  • ~90kk MD5 Hashfile for Debugging and Benchmarking

    Resources
    2
    0 Votes
    2 Posts
    584 Views
    P
    That's great, thank you.
  • wordlists for a specific country

    General Discussion
    3
    0 Votes
    3 Posts
    485 Views
    A1131A
    CN passwords International
  • Emails rules extractor

    Scripts
    2
    0 Votes
    2 Posts
    669 Views
    A1131A
    Analyzes and displays the top 20 (customizable by def print_top_domains) overall domains (NEW). Ready to use in script. #!/usr/bin/env python3 """ Email-Based Hashcat Rule Extractor This script processes a file containing email addresses, extracts trailing digit sequences from the usernames (before the '@'), filters them by specified domains, and generates Hashcat-compatible rule strings. It first displays the top 20 most frequent domains in the input file to help the user decide which domains to target for rule extraction. Functionality: - Reads email addresses from an input file. - **Analyzes and displays the top 20 overall domains (NEW).** - Filters addresses by user-specified domain(s) (e.g., 'gmail.com', 'yahoo.com'). - Extracts trailing digits from the local-part (e.g., 'user123' -> '123'). - Groups and counts digit-domain combinations. - Generates Hashcat rules from the most common combinations. - Saves rules to an output file. - Displays the top 5 most frequent patterns with example emails. Usage: - Run the script and provide: 1. Path to the input file containing emails (one per line). 2. Comma-separated list of domains to filter (after seeing the top domains). 3. Path to save the output Hashcat rules. """ import sys import re from collections import Counter, defaultdict def get_file_path(prompt): """Handles continuous prompting until a non-empty path is entered.""" while True: path = input(prompt).strip() if path: return path print("Path cannot be empty. Please try again.") def extract_data_from_email(email): """ Extracts the local part and domain from an email. Returns (digits, domain) if the local part ends in digits, otherwise None. """ # Regex to validate email structure and separate user/domain match = re.match(r'^([a-zA-Z0-9._%+-]+)@([a-zA-Z0-9.-]+\.[a-zA-Z]{2,})$', email.strip()) if not match: return None user, domain = match.groups() domain = domain.lower() # Normalize domain to lowercase # Check for trailing digits in the local part (username) digits_match = re.search(r'(\d+)$', user) if digits_match: digits = digits_match.group(1) return digits, domain return None def string_to_hashcat_rule(s): """Converts a string (e.g., '[email protected]') to a Hashcat rule (e.g., '$1$2$3$@$g$m$a$i$l$.$c$o$m').""" return ''.join(f"${c}" for c in s) def print_top_domains(file_path, limit=20): # edit limit if required """Reads the file, counts all domains, and prints the top 'limit' domains.""" domain_counts = Counter() try: with open(file_path, 'r', encoding='utf-8') as f: for line in f: email = line.strip() if '@' in email: # rsplit ensures we only split once from the right _, domain = email.rsplit('@', 1) if domain: domain_counts[domain.lower()] += 1 except FileNotFoundError: print(f"\nError: File not found at '{file_path}'", file=sys.stderr) return False except Exception as e: print(f"\nAn error occurred while reading the file: {e}", file=sys.stderr) return False top_domains = [f"{domain} ({count})" for domain, count in domain_counts.most_common(limit)] print("\n" + "="*50) print(f"๐Ÿฅ‡ Top {limit} Domains Found in the Input File:") print("="*50) # Print the top domains comma-separated, without spaces, just like the original request's output print(','.join(domain for domain, count in domain_counts.most_common(limit))) print("="*50 + "\n") return True def main(): """Main function to handle user input, file processing, and rule generation.""" print("--- Hashcat Rule Extractor for Email Patterns ---") # 1. Get Input Path and Print Top Domains input_path = get_file_path("Enter path to input file containing emails: ") # Display the top domains before proceeding if not print_top_domains(input_path, limit=20): # Exit if file reading failed in print_top_domains sys.exit(1) # 2. Get Domains to Filter domains_input = input("Enter comma-separated domains to filter (e.g., gmail.com,yahoo.com): ").strip() # 3. Get Output Path output_path = get_file_path("Enter path to save generated hashcat rules: ") domains_to_include = set(domain.strip().lower() for domain in domains_input.split(',') if domain.strip()) if not domains_to_include: print("\nWarning: No domains were specified for filtering. Exiting.", file=sys.stderr) sys.exit(0) counter = Counter() examples = defaultdict(list) print("\nProcessing file...") try: with open(input_path, 'r', encoding='utf-8') as f: for line in f: email = line.strip() extracted = extract_data_from_email(email) if extracted: digits, domain = extracted if domain in domains_to_include: key = (digits, domain) counter[key] += 1 # Store a few examples for display later if len(examples[key]) < 3: examples[key].append(email) except Exception as e: print(f"An error occurred during file processing: {e}", file=sys.stderr) sys.exit(1) sorted_items = counter.most_common() # 4. Write Rules to Output File try: with open(output_path, 'w', encoding='utf-8') as out: for (digits, domain), count in sorted_items: rule = string_to_hashcat_rule(digits + '@' + domain) out.write(f"{rule}\n") except Exception as e: print(f"Error writing to output file '{output_path}': {e}", file=sys.stderr) sys.exit(1) # 5. Display Summary print(f"\nDone! {len(sorted_items)} rules written to {output_path}") print("\nTop 5 extracted rules with examples:") if not sorted_items: print(" No patterns found matching the specified domains and having trailing digits.") return for (digits, domain), count in sorted_items[:5]: rule = string_to_hashcat_rule(digits + '@' + domain) print(f" Rule: {rule} | Count: {count} | Examples: {', '.join(examples[(digits, domain)])}") if __name__ == '__main__': main() https://raw.githubusercontent.com/A113L/Bucket/refs/heads/main/emailr.py
  • Hashcat Rules

    Hashcat Rules
    17
    0 Votes
    17 Posts
    4k Views
    oe3p32wedwO
    thanks for your work!
  • 41M+ 40hex Hashes

    Standard: MD5, SHA1, SHA256, etc.
    4
    0 Votes
    4 Posts
    907 Views
    V
    I think I did a quick run, just using cpu, currenctly I don't have a gpu, and many sql5 are short in lenght, and also being only numbers. This might help to anyone interested to give a run with only that algo, cleaneaning this kind of specific stuff.
  • 25 Hashes or Less Requests (Windows)

    Pinned Windows: LM, NTLM, DCC, DCC2
    5
    1 Votes
    5 Posts
    1k Views
    cycloneC
    @crack365 said in 25 Hashes or Less Requests (Windows): hashcat -m 1000 john --format=NT john --format=NT-opencl 0589F1147BA9F4948414E55E6CF2CE5C 8A53B66F187C676F601870B88E5F4E4D 69AF03F8B8E64F288131D2CDD62CAF74 539A615622475F3012BD9640D506E8E5 A724A56F02F8AEC08162AE1E7CFF60EA ACA40560CDE197233A22612BFA171057 B0E03A1682720A09A58BDE5DDE19F423 C95A4DC54A57D3ABDF8E04B8CE2FF27C D8B7ED5A849075C04AB341C2FA249F06 E25704E15CC5CF6C1EDA64D92720DF4F 764DB1FE05BF0E6D5E65EEB5DFC69FC9 CA9000D2022576A4ABE77A2344138C76 b0e03a1682720a09a58bde5dde19f423:update159
  • 25 Hashes or Less Requests (Standard)

    Pinned Standard: MD5, SHA1, SHA256, etc.
    10
    1 Votes
    10 Posts
    2k Views
    cycloneC
    @crack365 said in 25 Hashes or Less Requests (Standard): 0b06813ab7717dd7423d9bbef3572c91 7e49578820c4dd7c15391fcce4d4312b 37befe5d759b1077abc4f6ebd71feea9 55fdd5a905ad789303eecb65a53a8abb 61ac8215828ad230e5ff964037dc7741 85a76f2c339fbf38706625a438c78583 125efd3a22d5e7707b318d9aa11567bc 251a428ee267340c75b0c5b53d065d17 4781d31eb4a26322cadb81b46d984410 9170cd29916bc3ad5692415facc09446 93414c61d4a24443a36c8f6b9b79f2b3 750961df1b1d3bfd568a24185cd869bc 92450469b138edd7529d1fdfae6b095b c07d8f5b5fcf63c4a847087d02653642 ce05f8b8ccec2697d3feaeac62c31226 d67c5240977e949d591da2f9cdabecc0 d80b01fb0b5e73695f3bf651a23f47b8 ec1bddfbc3e66f1fed12416baec7b709 Found: 9170cd29916bc3ad5692415facc09446:parisiivogel
  • 940k MD5 Hashes

    Standard: MD5, SHA1, SHA256, etc.
    6
    0 Votes
    6 Posts
    1k Views
    N
    -m2600 759_found.txt 206509_left.7z
  • Pro Tips

    Pinned Resources jtr
    14
    4 Votes
    14 Posts
    2k Views
    freerouteF
    Title: hcxcommic. ZeroBeat: ZeroBeat Source: https://github.com/ZerBea/hcxtools Description:It takes as input a 22000 hashcat -o file and a hash file and converts it to a HEX:PLAIN file. Accepted by hashmob if the MIC is in both input files present. That makes it much easier to submit findings to hashmob.net. Download a 22000 left list from hashmob either via web interface (filter by 22000) https://hashmob.net/hashlists/user or by ID (get if via web interface (https://hashmob.net/hashlists/user) I prefer via ID: (12612 is the ID shown in hm web interface: $ wget https://cdn.hashmob.net/hashlists/12589/125892.left Run hashcat against this list and use its -o option to store the findings to file! Either use your own word list $ hashcat -m 22000 -o 12589.found 12589.left wordlist ... Recovered........: 8/3358 (0.24%) Digests (total), 8/3358 (0.24%) Digests (new), 8/2857 (0.28%) Salts ... Or get one from wpa-sec $ wget https://wpa-sec.stanev.org/dict/cracked.txt.gz $ hashcat -m 22000 -o 12589.found 12589.left wordlist Generate the hash file accepted by hm: $ hcxcommic 12589.found 12589.left > hm.found Submit hm.found to hashmob (choose 22000). Note: hasmob marks some hashes as invalid. That's because hashmob has a massif(!) missing new line (\0a) problem! It has been reported.

Who's Online [Full List]

11 users active right now (3 members and 8 guests).
hashpwn-bot, v1cvap0r

Board Statistics

Our members have made a total of 8.5k posts in 167 topics.
We currently have 338 members registered.
Please welcome our newest member, segfault.
The most users online at one time was 49 on Thursday, December 26, 2024.