Skip to content
  • Wordpress v6.8 Bcrypt - hmac-sha384

    General Discussion
    1
    1 Votes
    1 Posts
    839 Views
    No one has replied
  • Quick Way to Crack VB 2611 Salts

    Scripts
    2
    0 Votes
    2 Posts
    881 Views
    A1131A
    #!/bin/bash # simple script to save your time on file operations while cracking vBulletin < 3.8.5 hashes without salts using hashcat # popular types of vBulletin salt - ?a?a?a, ?h?h?h?h?h?h, ?d?d?d?d?d # download hashgen - https://github.com/cyclone-github/hashgen (used to convert $[HEX] hashes with colon-containing salts and generating hashed wordlist) # Function to read file paths with validation read_file_path() { local prompt="$1" local result_var="$2" local path while true; do read -r -p "$prompt" path if [ -f "$path" ]; then # Use eval to set the variable passed by name eval "$result_var=\"$path\"" break else echo "ERROR: File not found: $path. Please try again." fi done } echo "--- Interactive vBulletin Salt Cracker Configuration ---" # --- Input Acquisition --- # 1. Hash list path read_file_path "Enter the path to the hash list (e.g., hashlists/main.txt): " HASHLIST_PATH # 2. Wordlist path read_file_path "Enter the path to the wordlist (e.g., wordlists/top1000.txt): " WORDLIST_PATH # 3. Mask (optional, with default value) read -r -p "Enter the mask for salt cracking (e.g., ?h?h?h?h?h?h) [Default: ?a?a?a]: " CRACKING_MASK if [ -z "$CRACKING_MASK" ]; then CRACKING_MASK="?a?a?a" fi # Generate dynamic paths WORDLIST_BASENAME=$(basename "$WORDLIST_PATH") HASHED_WORDLIST_PATH="md5_wordlists/${WORDLIST_BASENAME}.md5" echo "--- Settings Confirmed ---" echo "Hash List: $HASHLIST_PATH" echo "Word List: $WORDLIST_PATH" echo "Mask: $CRACKING_MASK" echo "Hashed Word List Output: $HASHED_WORDLIST_PATH" echo "------------------------------" sleep 2s # --- Tool Verification --- if ! command -v hashcat &> /dev/null; then echo "ERROR: hashcat not found. Ensure it is in your PATH." exit 1 fi if [ ! -f ./hashgen ]; then echo "ERROR: The ./hashgen file was not found. Ensure it is in the current directory and is executable." exit 1 fi # --- STEP 1: Potfile Cleanup --- echo "--- STEP 1: Cleaning potfile ---" if [ -f "hashed.pot" ]; then echo "Creating backup: hashed.pot -> hashed.pot.bak" cat hashed.pot >> hashed.pot.bak 2>/dev/null else echo "hashed.pot not found, skipping backup." fi echo '' > hashed.pot sleep 3s # --- STEP 2: Generate Hashed Wordlist --- echo "--- STEP 2: Generating hashed wordlist ---" mkdir -p md5_wordlists ./hashgen -m 0 -w "$WORDLIST_PATH" -o "$HASHED_WORDLIST_PATH" sleep 3s # --- STEP 3: Crack Salts --- echo "--- STEP 3: Cracking salts (Mode -m0 -a6) ---" hashcat -d1 -m0 -a6 -w4 --hwmon-temp-abort=95 --potfile-path=hashed.pot "$HASHLIST_PATH" "$HASHED_WORDLIST_PATH" "$CRACKING_MASK" --remove sleep 3s # --- STEP 4: Prepare Hashes for Wordlist Cracking --- echo "--- STEP 4: Preparing hashes for cracking (m2611 format) ---" sleep 3s # 1. Process NON-HEX lines (already cracked passwords) # Corrected format: HASH:PLAINTEXT (Single colon) grep -v HEX hashed.pot | sed 's/^\(.\{65\}\)/\1:/' | cut -d: -f1,3 | sed -E 's/^(.{32}):(.*)$/\1:\2/' > 2611_to_crack.txt sleep 3s echo "Converting HEX strings" # 2. Convert HEX strings grep HEX hashed.pot | cut -d: -f2 > hex.tmp grep HEX hashed.pot | cut -d: -f1 > hash.txt ./hashgen -m plaintext -w hex.tmp -o hex.txt sleep 3s # 3. Combine HEX hashes and append to 2611_to_crack.txt # Corrected format: HASH:HEX_SALT (Single colon) paste -d : hash.txt hex.txt | sed -E 's/^(.{32}):(.*)$/\1:\2/' >> 2611_to_crack.txt sleep 3s echo "Deleting temporary files" # 4. Remove temporary files rm -f ./{hash.txt,hex.txt,hex.tmp} sleep 3s # --- STEP 5: Crack Hashes with Wordlist (Mode -m2611) --- echo "--- STEP 5: Cracking hashes with wordlist -a0 -m2611 ---" hashcat -d1 -m2611 -a0 -w4 --potfile-path=hashcat.pot.salted 2611_to_crack.txt "$WORDLIST_PATH" sleep 3s # --- STEP 6: Export Cracked Hashes --- echo "--- STEP 6: Writing/Appending last cracked hashes into file ---" hashcat -d1 -m2611 -a0 -w4 -O --hwmon-temp-abort=95 --hwmon-disable --potfile-path=hashcat.pot.salted 2611_to_crack.txt --show > 2611_cracked.txt sleep 3s echo "Done." Preview
  • Definition of the hashing algorithm.

    Unknown Algo
    1
    0 Votes
    1 Posts
    697 Views
    No one has replied
  • Terms of Service & Privacy Policy

    Pinned Locked Forum Rules (MUST READ)
    1
    0 Votes
    1 Posts
    805 Views
    No one has replied
  • Import Hashcat Rules into John the Ripper

    John the Ripper
    2
    2 Votes
    2 Posts
    1k Views
    C
    I do it like this since I'm a windows user I go to cygwin64/home/pcname/JtR/run/rules Use e.g. best64.rule file Copy your hashcat rules to best64.rule file and save and you can run your hashcat rules from file best64.rule That way I don't have to edit my config file since I don't use JtR that often
  • 0 Votes
    2 Posts
    678 Views
    D
    A "clean one" I wean that not all third pepole have it. I had a couple but that was along time ago. So if you please. I will be thankful
  • jotti - VirusTotal Alternative

    Network & IP
    2
    1 Votes
    2 Posts
    779 Views
    cycloneC
    New release: v1.0.0; 2025-08-27 - stable v1.0.0 release - enforce Jotti's 250MB max file limit - added upload progress bar - added HTTP client timeout to avoid hangs - added non-zero exit on rate limit - tidied up logic in URL, filename, directory parsing
  • 0 Votes
    13 Posts
    2k Views
    174region1741
    aaNMONeH:Qqwe4566 ogv6TBFe:eyEmme0324
  • hashcat Info

    Pinned Locked hashcat
    2
    1 Votes
    2 Posts
    666 Views
    cycloneC
    update: hashcat v7.1.1 released https://github.com/hashcat/hashcat/releases/tag/v7.1.1 changelog: * changes v7.1.0 -> v7.1.1 ## ## Improvements ## Docker: Add initial support for AMD GPUs when running Hashcat inside Docker using HIP and OpenCL Hardware Monitor: Suppress fan speed warnings for unified memory setups (typically internal GPUs) Testing Framework: Enable hardware monitor to improve testing of memory-heavy algorithms Unit tests: Updated install_modules.sh to use an external module for Digest::MD6 ## ## Bugs ## - Fixed multi-hash handling in LUKS2 and KeePass (KDBX4), while single-hash remained unaffected * changes v7.0.0 -> v7.1.0 ## ## New Algorithms ## ## Endpoint - Added hash-mode: AS/400 DES - Added hash-mode: AS/400 SSHA1 - Added hash-mode: Blockchain, My Wallet, Legacy Wallets - Added hash-mode: Cisco-ISE Hashed Password (SHA256) - Added hash-mode: Keepass4 - Added hash-mode: SAP CODVN H (PWDSALTEDHASH) isSHA512 - Added hash-mode: sm3crypt $sm3$, SM3 (Unix) ## Primitives, KDFs, Libraries - Added hash-mode: BLAKE2b-256 - Added hash-mode: MD6 (256) ## Constructs - Added hash-mode: BLAKE2b-256($pass.$salt) - Added hash-mode: BLAKE2b-256($salt.$pass) - Added hash-mode: sha224($pass.$salt) - Added hash-mode: sha224($salt.$pass) - Added hash-mode: sha224(sha1($pass)) - Added hash-mode: sha224(sha224($pass)) ## ## Improvements ## - Attack-Modes: Use 64-bit counters for amplifier keyspace - Host Memory: Update method to query free host memory using /proc/meminfo when available - Docker: Add initial support for running hashcat inside Docker - Device Memory: Warn instead of waiting on high GPU memory usage - Backends: Enhanced AMD Windows OpenCL and HIP compatibility for legacy models - Rules: Add early syntax check for -j and -k rules - Device Memory: Do not disable hwmon interface by default in speed-only and progress-only mode - JSON output: Refactor Bridge unit reporting for clarity - Backends: Ignore devices from Microsoft OpenCL D3D12 platform - Building: Add MAINTAINER_MODE flag to disable hardcoded CPU optimization flags - Bash: Add missing parameters to bash completion script - Dependencies: Downgraded unrar source from 6.2.7 to 6.0.5 - Benchmark: Update default hash-mode selection - Libraries: DES and Blowfish restructure - Building: Add initial support for OpenBSD and DragonflyBSD ## ## Bugs ## - Fix broken JSON formatting when using the --status-json flag - Fix issue where -k single rules were ignored when used with -a 1 and -S ## ## Python Bridge ## - Fix unsalted hashlist support - Fix the esalt structure, it was too large - Improve support from 1:1 password-to-hash to 1:N password-to-hashes - Improve stand-alone debugging of Python Bridge stubs - Improve salt/esalt debugging of Python Bridge stubs - Enable potfile output by default for -m 73000 and 72000 ## ## Other changes ## - Argon2: Add argon2_init() wrappers to support private address space - Change hash-category for hash-modes 25600, 25800, 28400 and 30600 to HASH_CATEGORY_RAW_HASH_SALTED - Suppress optimization advice in final approach mode - Backend: Split backend_session_begin() into smaller compute-runtime specific functions - Sanity check: Abort if a custom-charset is defined on the command line and a mask file is used - Building: Disable Argon2 optimized path on RISC-V - Shared: improved 32-bit and 64-bit add and multiply overflow helper functions
  • 0 Votes
    9 Posts
    1k Views
    C
    found_119.txt left_2812.txt
  • 0 Votes
    8 Posts
    1k Views
    cycloneC
    You can submit a support ticket on hashes.com and ask them to add support for the latest hashcat 26600 and 26610 algos that were released with hashcat v7. https://hashes.com/en/support
  • 809k -m 1420 sha256($salt.$pass)

    Standard: MD5, SHA1, SHA256, etc.
    3
    0 Votes
    3 Posts
    438 Views
    A1131A
    3395_found.txt 710506_left.zip
  • DEFCON Jabbercracky

    Contest / CTF
    2
    3 Votes
    2 Posts
    806 Views
    cycloneC
    Great game to all who played on both Competitive and Casual, and congrats to team hashcat for 1st place, team hashmob for a close 2nd in the Competitive class. https://defcon.jabbercracky.com/ Competitive leaderboard: [image: 1754853029372-5f69874d-0975-44b9-952f-8cca315ae43d-image-resized.png] Competitive graph: [image: 1754853053767-403ff692-0a1c-4ed4-8894-774bf4f73b93-image-resized.png]
  • 2,7kk+ 32hex Hashes

    Standard: MD5, SHA1, SHA256, etc.
    17
    0 Votes
    17 Posts
    2k Views
    S
    -m 3315_found 3315_found.txt https://gofile.io/d/tNDJe4 left
  • 1,3M+ vBulletin Hashes

    Forum: IPB, vBulletin, SMF, phpBB3, MyBB, etc.
    7
    0 Votes
    7 Posts
    1k Views
    N
    7220_found.txt 1015924_left.7z
  • hashcat GPU benchmarks

    General Discussion
    14
    0 Votes
    14 Posts
    3k Views
    cycloneC
    hashcat v7.0.0+4.2 benchmark (updated 2025/08/02@16:25) # gpu: nvidia rtx 4090 # manufacture: msi # model: suprim liquid x # settings: 450w stock settings # vbios: 95.02.18.00.52 # 08/02/2025 # NVIDIA-SMI 575.57.08 # CUDA Version: 12.9.1 # hashcat (v7.0.0+4.2) ./hashcat.bin -b hashcat (v7.0.0-4-g9727714cf) starting in benchmark mode Benchmarking uses hand-optimized kernel code by default. You can use it in your cracking session by setting the -O option. Note: Using optimized kernel code limits the maximum supported password length. To disable the optimized kernel code in benchmark mode, use the -w option. Initializing bridges. Please be patient...Initialized bridgesInitializing backend runtimes. Please be patient...Initialized backend runtimesInitializing backend devices. Please be patient...Initialized backend devicesCUDA API (CUDA 12.9) ==================== * Device #01: NVIDIA GeForce RTX 4090, 23688/24080 MB, 128MCU OpenCL API (OpenCL 3.0 CUDA 12.9.76) - Platform #1 [NVIDIA Corporation] ======================================================================= * Device #02: NVIDIA GeForce RTX 4090, skipped Benchmark relevant options: =========================== * --backend-devices=2 * --backend-devices-virtmulti=1 * --backend-devices-virthost=1 * --optimized-kernel-enable ------------------- * Hash-Mode 0 (MD5) ------------------- Speed.#01........: 164.2 GH/s (90.81ms) @ Accel:128 Loops:1024 Thr:896 Vec:8 ---------------------- * Hash-Mode 100 (SHA1) ---------------------- Speed.#01........: 58208.9 MH/s (73.51ms) @ Accel:64 Loops:1024 Thr:512 Vec:1 --------------------------- * Hash-Mode 1400 (SHA2-256) --------------------------- Speed.#01........: 21947.7 MH/s (91.50ms) @ Accel:15 Loops:1024 Thr:1024 Vec:4 --------------------------- * Hash-Mode 1700 (SHA2-512) --------------------------- Speed.#01........: 7476.6 MH/s (89.57ms) @ Accel:8 Loops:1024 Thr:640 Vec:1 ------------------------------------------------------------- * Hash-Mode 22000 (WPA-PBKDF2-PMKID+EAPOL) [Iterations: 4095] ------------------------------------------------------------- Speed.#01........: 2574.3 kH/s (88.52ms) @ Accel:7 Loops:1024 Thr:1024 Vec:1 ----------------------- * Hash-Mode 1000 (NTLM) ----------------------- Speed.#01........: 284.1 GH/s (73.54ms) @ Accel:192 Loops:1024 Thr:896 Vec:8 --------------------- * Hash-Mode 3000 (LM) --------------------- Speed.#01........: 155.7 GH/s (95.78ms) @ Accel:448 Loops:1024 Thr:256 Vec:1 -------------------------------------------- * Hash-Mode 5500 (NetNTLMv1 / NetNTLMv1+ESS) -------------------------------------------- Speed.#01........: 158.2 GH/s (77.39ms) @ Accel:96 Loops:1024 Thr:1024 Vec:1 ---------------------------- * Hash-Mode 5600 (NetNTLMv2) ---------------------------- Speed.#01........: 11696.0 MH/s (89.49ms) @ Accel:8 Loops:1024 Thr:1024 Vec:1 -------------------------------------------------------- * Hash-Mode 1500 (descrypt, DES (Unix), Traditional DES) -------------------------------------------------------- Speed.#01........: 6321.6 MH/s (84.67ms) @ Accel:4 Loops:1024 Thr:1024 Vec:1 ------------------------------------------------------------------------------ * Hash-Mode 500 (md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)) [Iterations: 1000] ------------------------------------------------------------------------------ Speed.#01........: 70840.0 kH/s (96.54ms) @ Accel:56 Loops:1000 Thr:1024 Vec:1 ---------------------------------------------------------------- * Hash-Mode 3200 (bcrypt $2*$, Blowfish (Unix)) [Iterations: 32] ---------------------------------------------------------------- Speed.#01........: 248.8 kH/s (95.61ms) @ Accel:8 Loops:32 Thr:24 Vec:1 -------------------------------------------------------------------- * Hash-Mode 1800 (sha512crypt $6$, SHA512 (Unix)) [Iterations: 5000] -------------------------------------------------------------------- Speed.#01........: 1210.2 kH/s (85.52ms) @ Accel:4 Loops:1000 Thr:1024 Vec:1 -------------------------------------------------------- * Hash-Mode 7500 (Kerberos 5, etype 23, AS-REQ Pre-Auth) -------------------------------------------------------- Speed.#01........: 3642.8 MH/s (95.91ms) @ Accel:334 Loops:256 Thr:32 Vec:1 ------------------------------------------------- * Hash-Mode 13100 (Kerberos 5, etype 23, TGS-REP) ------------------------------------------------- Speed.#01........: 3551.8 MH/s (96.00ms) @ Accel:326 Loops:256 Thr:32 Vec:1 --------------------------------------------------------------------------------- * Hash-Mode 15300 (DPAPI masterkey file v1 (context 1 and 2)) [Iterations: 23999] --------------------------------------------------------------------------------- Speed.#01........: 463.4 kH/s (82.19ms) @ Accel:7 Loops:1000 Thr:1024 Vec:1 --------------------------------------------------------------------------------- * Hash-Mode 15900 (DPAPI masterkey file v2 (context 1 and 2)) [Iterations: 12899] --------------------------------------------------------------------------------- Speed.#01........: 262.2 kH/s (76.61ms) @ Accel:4 Loops:512 Thr:1024 Vec:1 ------------------------------------------------------------------ * Hash-Mode 7100 (macOS v10.8+ (PBKDF2-SHA512)) [Iterations: 1023] ------------------------------------------------------------------ Speed.#01........: 3273.1 kH/s (79.01ms) @ Accel:4 Loops:512 Thr:1024 Vec:1 --------------------------------------------- * Hash-Mode 11600 (7-Zip) [Iterations: 16384] --------------------------------------------- Speed.#01........: 2231.6 kH/s (91.80ms) @ Accel:17 Loops:4096 Thr:512 Vec:1 ------------------------------------------------ * Hash-Mode 12500 (RAR3-hp) [Iterations: 262144] ------------------------------------------------ Speed.#01........: 287.1 kH/s (71.10ms) @ Accel:5 Loops:16384 Thr:512 Vec:1 -------------------------------------------- * Hash-Mode 13000 (RAR5) [Iterations: 32799] -------------------------------------------- Speed.#01........: 278.7 kH/s (85.27ms) @ Accel:12 Loops:1024 Thr:512 Vec:1 -------------------------------------------------------------------------------- * Hash-Mode 6211 (TrueCrypt RIPEMD160 + XTS 512 bit (legacy)) [Iterations: 1999] -------------------------------------------------------------------------------- Speed.#01........: 1989.6 kH/s (90.02ms) @ Accel:6 Loops:500 Thr:1024 Vec:1 ----------------------------------------------------------------------------------- * Hash-Mode 13400 (KeePass 1 (AES/Twofish) and KeePass 2 (AES)) [Iterations: 24569] ----------------------------------------------------------------------------------- Speed.#01........: 332.1 kH/s (82.05ms) @ Accel:10 Loops:1024 Thr:512 Vec:1 ------------------------------------------------------------------- * Hash-Mode 6800 (LastPass + LastPass sniffed) [Iterations: 100099] ------------------------------------------------------------------- Speed.#01........: 92374 H/s (86.89ms) @ Accel:8 Loops:1024 Thr:768 Vec:1 -------------------------------------------------------------------- * Hash-Mode 11300 (Bitcoin/Litecoin wallet.dat) [Iterations: 200459] -------------------------------------------------------------------- Speed.#01........: 34141 H/s (78.29ms) @ Accel:4 Loops:1024 Thr:1024 Vec:1 Started: Sat Aug 2 16:11:47 2025 Stopped: Sat Aug 2 16:19:10 2025
  • Hashcat benchmark comparator

    hashcat
    1
    0 Votes
    1 Posts
    271 Views
    No one has replied
  • hashcat-6.2.6+1550 - beta

    hashcat
    3
    0 Votes
    3 Posts
    397 Views
    cycloneC
    There have been a lot of PR's merged since May 2025 and several beta's since then, so a bit hard to keep up with everything since there hasn't yet been an official list of updates published on hashcat.net. You can always compare the recent comments on github to see what's getting updated in the code base. Below are a few files / directories to monitor comments on to see what's been getting added, changed, or removed. https://github.com/hashcat/hashcat/blob/master/docs/changes.txt https://github.com/hashcat/hashcat/commits/master/ https://github.com/hashcat/hashcat/commits/master/src/modules https://github.com/hashcat/hashcat/commits/master/OpenCL
  • solflare_pwn - Solflare Vault Extractor & Decryptor

    Hash Cracking
    13
    2 Votes
    13 Posts
    2k Views
    cycloneC
    @Senses DM me on Matrix.
  • atomic_pwn - Atomic Vault Extractor & Decryptor

    Hash Cracking
    8
    1 Votes
    8 Posts
    1k Views
    J
    I have the files from Storage\leveldb\ i cant find the Mnemonic key hash from extractor ? can you help me please ?!!!

Who's Online [Full List]

7 users active right now (2 members and 5 guests).
hashpwn-bot, Rampage45

Board Statistics

Our members have made a total of 8.5k posts in 167 topics.
We currently have 338 members registered.
Please welcome our newest member, segfault.
The most users online at one time was 49 on Thursday, December 26, 2024.