New Hashcat 4.2.1: Hashcat is one of the fastest password violation tools that uses GPU to "decode" md5crypt, phpass, mscash2, and WPA / WPA2.
The first and only one that uses the GPGPU rule engine.
Those of you who know the tool, and you are looking for oclHashcat-plus, you should know that this version is deprecated (a long time ago), but all its services are available in oclHashcat.
IGuru.gr presents this tool to protect your systems and ONLY for that reason. We are against any kind of malicious use of the tool.
We should mention that Jens Steube, creator of the cracking toolcases Hashcat, has announced that its application and all its derivatives will from now on be available under an open source license.
"The final reason I decided to open the code was to implement bitsliced DES GPU kernels," Steube tells forum on his site.
"In order to achieve maximum efficiency and performance, salt must be integrated into the core (kernel) during compilation […] This means that the kernel should be compiled at runtime implementations from the user's system. This kind of setup with the kernel adjusting according to salt/hash is only possible if the source code is available.”
Below you will find the download links for the new version of Hashcat 4.2.1:
Name | Version | Date | Download | Signature |
---|---|---|---|---|
hashcat binaries | v4.2.1 | 2018.08.07 | Download | PGP |
hashcat sources | v4.2.1 | 2018.08.07 | Download | PGP |
Signing key on PGP keyservers: RSA, 2048-bit.
Key id: 2048R/8A16544F.
Fingerprint: A708 3322 9D04 0B41 99CC 0052 3C17 DA8B 8A16 544F