Project “work” for a year!

You can congratulate us!

Our service decryption hashes, password recovery from wifi and bitcoin wallet marks a year.

Project start date was December 8, 2015 with a simple html code on the site to the popular cms system.

Update decoding section

There was a section upgrade hash decrypt Free

Now you can see the view request to decrypt the password at the same time from a given hash.

Also, when receiving the password from the hash, you will come to the post office with an automatic notification responses.

Service on decrypting hashes

Carry out recovery passwords for various types of hashes

Our service supports the following list of hashes to decrypt:
  • MD5
  • MD5 ($pass. $salt)
  • MD5 ($salt. $pass)
  • SHA1
  • SHA1 ($pass. $salt)
  • SHA1 ($salt. $pass)
  • MySQL323
  • MySQL 4.1/MySQL5 +
  • phpass MD5 (WordPress)
  • Md5 (Joomla)
  • phpass MD5 (phpBB3)
  • MD5 md5crypt (Unix), FreeBSD MD5, Cisco IOS-MD5 2
  • MD4
  • NTLM
  • Domain Cached Credentials (DCC), MS Cache
  • SHA256
  • SHA256 ($pass. $salt)
  • SHA256 ($salt. $pass)
  • descrypt, DES (Unix), Traditional DES
  • md5apr1, MD5(APR), Apache MD5 2
  • WPA/WPA2
  • Double MD5
  • LM
  • Office 2007
  • Office 2010
  • Office 2013
  • Ms Office? 2003 + oldoffice RC4, MD5 $ oldoffice $
  • Ms Office? 2003 + oldoffice RC4, SHA1 $ oldoffice $ 4
  • PDF 1.1-1.3 (Acrobat 4-2)
  • PDF 1.4-1.6 (Acrobat 5-8)
  • Level 3 PDF 1.7 (Acrobat 9)
  • Level 8 PDF 1.7 (Acrobat 10-11)
  • 7-Zip
  • Blockchain, My Wallet
  • Joomla < 2.5.18
  • osCommerce, xt: Commerce
  • Skype
  • SMF > = v1.1
  • MSSQL (2000)
  • MSSQL (2005)
  • MSSQL (2012), MSSQL (2014)
  • vBulletin < v3.8.5
  • vBulletin > = v3.8.5
  • IPB2 +, MyBB 1.2 +

If your hash is not in the list of the above-go to page
example hashes of virtually all existing at the moment, algorithms, and perhaps you will be able to determine the type of the hash yourself.


If your algorithm does not found in lists, not in despair, send. On receipt of the order, the consultant will update algorithm and you order implemented otpishetsya on page “order Hash”

There was a section of free checking hashes

Decoding Service hashes

added a new section where you can order a transcript of the hash type you need for free.
Submission of hash also via the feedback form, the only exception as compared to a paid transcript.
No fee is charged
The response time for this section during the day.

Article interception handshake to wifi network

Published a new article to find and intercept data packets WiFi network. The so-called handshake wifi.

 Full article describes step by step action for the implementation of 100% capture.

 Participates in the process of one of the best assemblies currently AirSlax

 The article itself, you can find a link or under Article!

Weak password? Create a fast and a new password

Added to the site password generator online.

You can quickly and efficiently create complex, or whatever password accidentally.

Do not forget that by passwords are not stored on the site, please do not forget the previously created passwords!

Review of the MD5 algorithm

Encrypt and decrypt the MD5 hash code

Sometimes it happens that you do not remember the code to the front door, and standing there, waiting for that one memory is better than yours. They say the best memory of the scientists. They still remembering the days when they were for new knowledge burned with a hot iron heel. So they came up with such a terrible thing as MD5 decryption. And the most interesting before they managed it and even encrypt!


MD5 what is it?

MD5 is one of hash algorithms 128-bit basis. By hashing the input conversion understood by a particular algorithm to a bit string of a certain length. At the same time resulting in the result of the calculation is represented in hexadecimal. It’s called a hash, or hash sum hash code.

Hashing process is widely used in programming and web industry. Basically, to create unique values in an associative array identifiers.

Scope of hashes:

  • Storing passwords in the databases of security data
  • In the framework of modern cryptography to create a line of unique keys
  • Creation of electronic signatures
  • Verification of authenticity and integrity of the computer file system elements

Continue reading