Xanadrel Profile Banner
Xanadrel Profile
Xanadrel

@Xanadrel

Followers
485
Following
819
Media
54
Statuses
1K

Hashcracking, Password Analysis, Programming, Percussive maintenance expert. Team @hashcat

France
Joined August 2010
Don't wanna be here? Send us removal request.
@hashcat
hashcat
3 months
Team Hashcat took first place in the Jabbercracky contest at #DEFCON33! Thanks to HashMob for putting up a great fight and congrats on 2nd place! We're looking forward to your write-up! Huge thanks to Jabbercracky, @Stealthsploit, and @PasswordVillage for organizing!
5
37
235
Tomorrow at 12pm PDT the #DEFCON Jabbercracky CTF begins at @PasswordVillage. Practice your password cracking-fu in the casual league or clash with the pros in the advanced league. See you all on the leaderboard. Still time to sign up! https://t.co/HCq9gKg7f9 #hashcat
0
3
7
@hashcat
hashcat
3 months
hashcat v7.0.0 released! After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. Detailed writeup is available here: https://t.co/fxAIXNXsEr
22
377
1K
@CrackMeIfYouCan
KoreLogic
5 months
CMIYC ( https://t.co/JeF6ysFDHI) will not make it to DEF CON this year. https://t.co/GGsFUSgSnm will be there! We intend to do a contest later this year.
0
3
3
@tr0ntastic
trontastic
1 year
Congrats to Hashmob, Team @hashcat and @CynoPrime on #cmiyc2024 ! Big thanks to @CrackMeIfYouCan for consistently putting on cracking competitions that are unique and challenging! Looking forward to next year. Plans are already underway :)
0
2
5
@hashcat
hashcat
1 year
Team hashcat has placed 2nd in the @CrackMeIfYouCan contest at #DEFCON32! Congrats to HashMob on 1st, and @CynoPrime on 3rd place. Looking forward to your writeups! Big thanks to KoreLogic and @PasswordVillage for organizing the contest!
1
24
66
New blog post: Registering a Team and Cracking the Test Hashes for #CMIYC2024 #Defcon. Now you really don't have any excuse not to compete! If you are interested and want to start a street team, don't hesitate to reach out and ask questions!
0
3
6
@tr0ntastic
trontastic
1 year
trontastic is online.
0
3
6
@zeynep
zeynep tufekci
2 years
Important: This new calling feature is ENABLED by default and will reveal your IP address to your callers! To opt out, go to settings->privacy and safety->direct messages->disable calls IP address will potentially identify you so especially important for pseudonymous accounts.
@XNews
News
2 years
audio and video calling are now available to everyone on X! who are you calling first?
49
791
1K
@phoronix
Phoronix
2 years
Exclusive & Benchmarks: AMD Quietly Funded A Drop-In CUDA Implementation Built On ROCm: It's Now Open-Source This allows unmodified CUDA apps to run on Radeon GPUs and in some workloads CUDA on Radeon is faster than native OpenCL or HIP/ROCm backends! https://t.co/9pY448vN5E
Tweet card summary image
phoronix.com
While there have been efforts by AMD over the years to make it easier to port codebases targeting NVIDIA's CUDA API to run atop HIP/ROCm, it still requires work on the part of developers.
20
457
1K
@brianwhelton
๐”…อ›๐”ฏอ›๐”ฆอ›๐”žอ›๐”ซอ› อ›๐”šอ›๐”ฅอ›๐”ขอ›๐”ฉอ›๐”ฑอ›๐”ฌอ›๐”ซอ›
2 years
18
254
2K
@vxunderground
vx-underground
2 years
This one simple trick will land you a job anywhere
37
343
2K
@HumansNoContext
NO CONTEXT HUMANS
2 years
276
8K
70K
@AlecMuffett
Alec Muffett
2 years
CAN WE PLEASE DROP THE #ONLINESAFETYBILL AND DO THIS AUSTRALIAN THING INSTEAD PLEASE?
3
22
38
Here is Part 2 of my series "Using JupyterLab to Manage Password Cracking Sessions (A CMIYC 2023 Writeup)" https://t.co/1aJ1211hBY In this one, some passwords are actually cracked!
0
2
3
@john_users
john-users team
2 years
Congratulation to teams @hashcat and @cynoprime rocking the Pro bracket in @CrackMeIfYouCan! Thanks to KoreLogic for organizing new iteration of the wonderful contest!
0
2
3
Part 1 of my CMIYC writeup: Using JupyterLab to Manage Password Cracking Sessions https://t.co/wT4cZQfqk7 Not many passwords are cracked, but graphs are made, and a certain Team @hashcat functionality is recreated.
0
2
11