New Hashcat 3.6: Hashcat is one of the fastest password violation tools he uses GPU to "decode" md5crypt, phpass, mscash2, and WPA / WPA2.
The first and only one that uses GPGPU rule engine.
For those of you who know the tool, and you are looking for ocleashat-plus, you should know that this version has been removed (long ago), but all of its services are available at oclashashcat.
The application runs on all versions of Windows and Linux on 32 and 64 bit.
IGuru.gr presents this tool to protect your systems and ONLY for that reason. We are against any kind of malicious use of the tool.
We should mention that Jens Steube, creator of the crack toolkit, Haschcat, announced that its application and all its derivatives will now be available with open source licensing.
"The final reason I decided to open the code was to implement bitsliced DES GPU kernels," Steube tells forum on his site.
“To achieve maximum performance and performance, salt should be included in the kernel context during compilation […] This means that the kernel should be compiled at runtime by the user's system. This kind of setup with the kernel adjusting according to the salt/hash is only possible if it is availables the source code.”
Below you will find the download links for the new version of Hashcat:
Name | Version | Date: | Download | Signature |
---|---|---|---|---|
hashcat binaries | v3.6.0 | 2017.06.09 | Download | PGP |
hashcat sources | v3.6.0 | 2017.06.09 | Download | PGP |
Signing key on PGP keyservers: RSA, 2048-bit. Key ID: 2048R / 8A16544F.
Fingerprint: A708 33229D040B4199CC 0052 3C17 DA8B 8A16 544F