alotdv
@AlongExc
Followers
50
Following
187
Media
5
Statuses
39
hashcat v7.1.0 released! This update includes important bug fixes, new features, and support for new hash-modes, including KeePass with Argon2. Read the full write-up here: https://t.co/rg8zfMUt3B
5
48
162
With the commit https://t.co/rDcsn9XbVE hashcat supports Apple's Metal as new compute backend. Thanks to @gm4tr1x for the contribution! All hash-modes and all attack-modes support OpenCL, CUDA, HIP or Metal as compute backend.
5
57
144
hashcat 6.2.0 update released! New Attack-Mode, Features, Algorithms and much more. Full release notes here: https://t.co/OlMpYXreyH
3
184
398
Added support to crack password-protected RAR 3 archives without header encryption (both compressed and uncompressed): https://t.co/wjMOu4ZGxr
1
60
178
Team hashcat won CrackMeIfYouCan 2020 password cracking contest @defcon. As close to the end as always with big respect to @CynoPrime and @john_users. Many many thanks to KoreLogic (@CrackMeIfYouCan) for organizing this event since 10+ years.
2
30
106
hashcat 6.0.0 major update released! New Features, new Algorithms, better Performance and much more. Full release notes here: https://t.co/wNTG88WsVY
13
477
960
Support for cracking PIN or password protected Bitlocker volumes added to upcoming hashcat 6.0.0 by @philsmd: https://t.co/Wf5h9b0yAb
2
122
295
Support for Electrum Wallet (Salt-Type 4 and 5) using secp256k1 added to upcoming hashcat 6.0.0 by @philsmd: https://t.co/9LjOpmkzda
1
40
102
Team hashcat won the @CrackMeIfYouCan contest at DEF CON 27! It was really close at the end. Congrats to @CynoPrime for 2nd place and to @john_users for 3rd place. Thanks to KoreLogic for organizing the contest.
0
36
76
Congratulations to team @hashcat for taking 1st place in the #crackthecon password cracking contest. Nicely done guys!
2
13
29
Support added to crack DiskCryptor (AES) Full-Disk Encryption 100% on GPU. Great contribution from @philsmd: https://t.co/BW6yykEsDT
2
74
157
Support added to crack QNX /etc/shadow hashes:
github.com
- Added hash-mode 19000 QNX /etc/shadow (MD5) - Added hash-mode 19100 QNX /etc/shadow (SHA256) - Added hash-mode 19200 QNX /etc/shadow (SHA512) Implements #35
3
41
86
hand-tuned hashcat 6.0.0 beta and 2080Ti (stock clocks) breaks NTLM cracking speed mark of 100GH/s on a single compute device
21
522
1K
Nvidia RTX 2080 FE @hashcat benchmarks from #Terahash / https://t.co/vyqpeF3cNB
https://t.co/UctXHxztq4
2
42
62
🚨UPDATE: T-Mobile now says "encrypted passwords" were compromised in latest data breach. We obtained a sample of one "encrypted password" and turns out it may be a Base64 string that decodes to a MD5 hash. In other words, it could potentially be cracked.
42
534
731