Homepage

[ Password cracker ]

Hash Cracker allows you to crack strings hashed with MD5, SHA1 and NTLM algorithms. When you tries to crack your hashed strings, the system automatically recognizes with which algorithm have been encrypted and will attempt to decrypt them.

Hash Cracker counts over than 700.000.000 of unique hashes that you can decrypt!

For more information about password cracking, you can consult the documentation.

Insert below your MD5, SHA1 and/or NTLM hashes, one per line (max 500):


Trick: click in the textbox and press Ctrl + v to paste your text.

CAPTCHA Image Refresh Image

[ Other interesting topics ]

[ Vulnerability Scanner ]

A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses. There are a number of types of vulnerability scanners available today, distinguished from one another by a focus on particular targets. While functionality varies between different types of vulnerability scanners, they share a common, core purpose of enumerating the vulnerabilities present in one or more targets. Vulnerability scanners are a core technology component of Vulnerability management.A vulnerability scanner can be used to conduct network reconnaissance, which is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed. Network reconnaissance is increasingly used to exploit network standards and automated communication methods.

[ Firewall ]

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer applications based upon a set of rules and other criteria. Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

[ Port Scanner ]

A port scanner is a software application designed to probe a network host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it. To portscan a host is to scan for listening ports on a single target host. To portsweep is to scan multiple hosts for a specific listening port. The latter is typically used in searching for a specific service, for example, an SQL-based computer worm may portsweep looking for hosts listening on TCP port 1433.