This tool lets you quickly identify weak passwords in seconds before launching your favourite tool. All data is processed on the client with JavaScript.
With a password generator, you can generate wordlist based on specific input data and use it to crack the hashes. You can use hashcat rules along with worlist to organize rule-based attacks.
There are several modes how you can use this tool:
Supported hash types: md5,md5(md5),md5(md5(md5))),sha1,sha256,sha512,JWT,ntlm,md5crypt,sha256crypt,sha512crypt, etc.
Type | Hash | Pass |
Name | Speed (hashes/sec) | Example |
---|---|---|
MD5 | 8743b52063cd84097a65d1633f5c74f5 | |
SHA1 | b89eaac7e61417341b710b727768294d0e6a277b | |
SHA256 | 127e6fbfe24a750e72930c220a8e138275656b8e5d8f48a98c3c92df2caba935 | |
SHA512 | 82a9dda829eb7f8ffe9fbe49e45d47d2dad9664fbb7adf72492e3c81ebd3e29134d9bc12212bf83c6840f10e8246b9db54a4859b7ccd0123d86e5872c1e5082f | |
NTLM | b4b9b02e6f09a9bd760f388b67351e2b | |
MD5CRYPT | $1$28772684$iEwNOgGugqO9.bIz5sk8k/ | |
SHA256CRYPT | $5$GX7BopJZJxPc/KEK$le16UF8I2Anb.rOrn22AUPWvzUETDGefUmAV8AZkGcD | |
SHA512CRYPT | $6$52450745$k5ka2p8bFuSmoVT1tzOyyuaREkkKBcCNqoDKzYiJL9RaE8yMnPgh2XzzF0NDrUhgrcLwg78xs1w5pJiypEdFX/ | |
JWT | eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.pF3q46_CLIyP_1QZPpeccbs-hC4n9YW2VMBjKrSO6Wg |
Use a set of utilities bundled into a single automated workflow to improve, simplify, and speed up resource discovery.
Try Demo