Project “work” for a year!
You can congratulate us!
Our service decryption hashes, password recovery from wifi and bitcoin wallet marks a year.
Project start date was December 8, 2015 with a simple html code on the site to the popular cms system.
Update decoding section
There was a section upgrade hash decrypt Free
Now you can see the view request to decrypt the password at the same time from a given hash.
Also, when receiving the password from the hash, you will come to the post office with an automatic notification responses.
Service on decrypting hashes decrypthash.com
Carry out recovery passwords for various types of hashes
Our service supports the following list of hashes to decrypt:
- MD5 ($pass. $salt)
- MD5 ($salt. $pass)
- SHA1 ($pass. $salt)
- SHA1 ($salt. $pass)
- MySQL 4.1/MySQL5 +
- phpass MD5 (WordPress)
- Md5 (Joomla)
- phpass MD5 (phpBB3)
- MD5 md5crypt (Unix), FreeBSD MD5, Cisco IOS-MD5 2
- Domain Cached Credentials (DCC), MS Cache
- SHA256 ($pass. $salt)
- SHA256 ($salt. $pass)
- descrypt, DES (Unix), Traditional DES
- md5apr1, MD5(APR), Apache MD5 2
- Double MD5
- Office 2007
- Office 2010
- Office 2013
- Ms Office? 2003 + oldoffice RC4, MD5 $ oldoffice $
- Ms Office? 2003 + oldoffice RC4, SHA1 $ oldoffice $ 4
- PDF 1.1-1.3 (Acrobat 4-2)
- PDF 1.4-1.6 (Acrobat 5-8)
- Level 3 PDF 1.7 (Acrobat 9)
- Level 8 PDF 1.7 (Acrobat 10-11)
- Blockchain, My Wallet
- Joomla < 2.5.18
- osCommerce, xt: Commerce
- SMF > = v1.1
- MSSQL (2000)
- MSSQL (2005)
- MSSQL (2012), MSSQL (2014)
- vBulletin < v3.8.5
- vBulletin > = v3.8.5
- IPB2 +, MyBB 1.2 +
If your hash is not in the list of the above-go to page
example hashes of virtually all existing at the moment, algorithms, and perhaps you will be able to determine the type of the hash yourself.
If your algorithm does not found in lists, not in despair, send. On receipt of the order, the consultant will update algorithm and you order implemented otpishetsya on page “order Hash”
There was a section of free checking hashes
Decoding Service hashes
added a new section where you can order a transcript of the hash type you need for free.
Submission of hash also via the feedback form, the only exception as compared to a paid transcript.
No fee is charged
The response time for this section during the day.
Article interception handshake to wifi network
Published a new article to find and intercept data packets WiFi network. The so-called handshake wifi. Full article describes step by step action for the implementation of 100% capture. Participates in the process of one of the best assemblies currently AirSlax The article itself, you can find a link or under Article!
Help in the recovery password from Skype
For instance, you forget your password in Skype, but you have it stored in the client skype.
Recover password via the website skype.com you can not.
Then this method you the perfect fit.
Please familiarize yourself with the new article on the forgotten password on the program skype
A new mini article about getting the password to excel, word, zip and rar
On the website in the article published instructions on obtaining a password hash from the encrypted Microsoft Office Excel Office documents. Possibilities of other components for zip and rar archives.
Weak password? Create a fast and a new password
Added to the site password generator online.
You can quickly and efficiently create complex, or whatever password accidentally.
Do not forget that by passwords are not stored on the site, please do not forget the previously created passwords!
Review of the MD5 algorithm
Encrypt and decrypt the MD5 hash code
Sometimes it happens that you do not remember the code to the front door, and standing there, waiting for that one memory is better than yours. They say the best memory of the scientists. They still remembering the days when they were for new knowledge burned with a hot iron heel. So they came up with such a terrible thing as MD5 decryption. And the most interesting before they managed it and even encrypt!
MD5 what is it?
MD5 is one of hash algorithms 128-bit basis. By hashing the input conversion understood by a particular algorithm to a bit string of a certain length. At the same time resulting in the result of the calculation is represented in hexadecimal. It’s called a hash, or hash sum hash code.
Hashing process is widely used in programming and web industry. Basically, to create unique values in an associative array identifiers.
Scope of hashes:
- Storing passwords in the databases of security data
- In the framework of modern cryptography to create a line of unique keys
- Creation of electronic signatures
- Verification of authenticity and integrity of the computer file system elements
What is the password encryption algorithm in the CMS or OS Windows?
There were two small article:
- About the password hashing algorithms in the CMS system (engine) such as Wordpres, Joomla, phpbb, vBulletin, osCommerce, DataLife Engine, IPB, and others.
- About the password hashing algorithms on different operating systems, such as Windows, Linux, FreeBSD, MacOS and other
For password encryption method also included an example of a hash.