Chick3nman512 Profile Banner
Chick3nman ๐Ÿ” Profile
Chick3nman ๐Ÿ”

@Chick3nman512

Followers
3K
Following
14K
Media
129
Statuses
4K

Sam Croley, Austin based password cracker & researcher; Team @hashcat Core Dev; CEO of Detack Inc. - @DetackGmbH; DMs always open

Austin, TX
Joined March 2009
Don't wanna be here? Send us removal request.
@Chick3nman512
Chick3nman ๐Ÿ”
5 months
Complete @hashcat benchmarks on the @NVIDIAGeForce RTX 5090 FE! Running nice and cool so far with solid improvements across the board. Most hash modes got at least a 20% uplift over the RTX 4090 and some modes boasting quite a bit more! . Full Benchmark:
Tweet media one
4
22
82
@Chick3nman512
Chick3nman ๐Ÿ”
6 days
RT @AlecMuffett: July 15th 1991: 34 years ago I published the first โ€œmodernโ€ password crackerโ€ฆ
Tweet media one
0
4
0
@Chick3nman512
Chick3nman ๐Ÿ”
1 month
RT @Paul_Reviews: This is one of the reasons so many apps are still vulnerable in 2025. This "master of information security" recommends #โ€ฆ.
0
1
0
@Chick3nman512
Chick3nman ๐Ÿ”
2 months
RT @CynoPrime: Tired of your password rules being half-baked?.The CsP kitchenโ€™s been cooking up something better. RuleChef serves Markov-seโ€ฆ.
Tweet card summary image
github.com
a markov based rule generator for hashcat/mdxfind/jtr - Cynosureprime/rulechef
0
7
0
@Chick3nman512
Chick3nman ๐Ÿ”
3 months
โ€œthe password will be hashed via SHA-512 before being passed to bcryptโ€. @bunjavascript makes the classic mistake of prehashing before applying bcrypt instead of enforcing an input length limit. This is not only less safe, itโ€™s specifically called out here
@bunjavascript
Bun
3 months
Roll your own auth with `Bun.password`
Tweet media one
0
0
13
@Chick3nman512
Chick3nman ๐Ÿ”
4 months
RT @winxp5421: Test hashes are live! . Test your submission platform / scripts.
0
4
0
@Chick3nman512
Chick3nman ๐Ÿ”
5 months
Tweet media one
5
0
23
@Chick3nman512
Chick3nman ๐Ÿ”
6 months
RT @lakiw: Question: Is there a repository of password/credential spaying wordlists collected via honeypots (or similar methods). Bonus poiโ€ฆ.
0
2
0
@Chick3nman512
Chick3nman ๐Ÿ”
8 months
Not sure what the expected service life is for a Yubikey, but my oldest(>10yrs of hard use) is still going strong despite lacking a little luster. I guess this is what @Yubico means when they say โ€œstrong multi-factorโ€. ๐Ÿ”
Tweet media one
8
13
167
@Chick3nman512
Chick3nman ๐Ÿ”
8 months
@PythonPr
Python Programming
9 months
Password Authentication using Python
Tweet media one
1
0
14
@Chick3nman512
Chick3nman ๐Ÿ”
9 months
Yours.
@j_opdenakker
John Opdenakker
9 months
What's your favorite password?.
1
2
9
@Chick3nman512
Chick3nman ๐Ÿ”
9 months
RT @Sarah_Cecc: Spoiler alert: it wonโ€™t change at all. Attackers can get passkeys with passwords. Synced passkeys provide zero ๐Ÿ‘ say it witโ€ฆ.
0
1
0
@Chick3nman512
Chick3nman ๐Ÿ”
11 months
RT @internetarchive: That's correct. Publishers removed '1984' from our library. ๐Ÿ•ณ๏ธ.
0
18K
0
@Chick3nman512
Chick3nman ๐Ÿ”
11 months
RT @CrackMeIfYouCan: We posted a bunch of details about password sets, encrypted challenge/hint files, etc.: #defcโ€ฆ.
infosec.exchange
We've added a page w/info about the password sets, encrypted files, and hints: https://contest-2024.korelogic.com/password-info.html #defcon
0
2
0
@Chick3nman512
Chick3nman ๐Ÿ”
11 months
RT @unix_ninja: Father of Unix Ken Thompson checkmated as his old password has finally been cracked โ€ข The Register
theregister.com
Aussie bod's AMD GPU smashes hash in just four days
0
12
0
@Chick3nman512
Chick3nman ๐Ÿ”
11 months
RT @Stealthsploit: Thanks @PasswordVillage for having me back for second year with the team at @defcon. GPUs ran, hashes rained, people leaโ€ฆ.
0
4
0
@Chick3nman512
Chick3nman ๐Ÿ”
11 months
RT @hashcat: Team hashcat has placed 2nd in the @CrackMeIfYouCan contest at #DEFCON32! Congrats to HashMob on 1st, and @CynoPrime on 3rd plโ€ฆ.
0
23
0
@Chick3nman512
Chick3nman ๐Ÿ”
1 year
RT @CrackMeIfYouCan: Less than 2h until this year's Crack Me If You Can contest starts!. Remember to follow for updโ€ฆ.
Tweet card summary image
infosec.exchange
67 Posts, 22 Following, 151 Followers ยท KoreLogic's password cracking contest at DEFCON
0
4
0
@Chick3nman512
Chick3nman ๐Ÿ”
1 year
RT @lakiw: If you want to compete in the #Defcon #CMIYC contest as a member of a pro team, team @john_users is accepting new members. It isโ€ฆ.
0
3
0