New Hashcat 4.2.1: Hashcat is one of the fastest password violation tools that uses GPU to "decode" md5crypt, phpass, mscash2, and WPA / WPA2.
The first and only one that uses GPGPU rule engine.
For those of you who know the tool, and you are looking for ocleashat-plus, you should know that this version has been removed (long ago), but all of its services are available at oclashashcat.
IGuru.gr presents this tool to protect your systems and ONLY for that reason. We are against any kind of malicious use of the tool.
It should be mentioned that the Jens Steube, creator of the cracking toolkit Hashcat, has announced that his application and all its derivatives will from now on be available under an open source license.
"The final reason I decided to open the code was to implement bitsliced DES GPU kernels," Steube tells forum on his site.
"In order to achieve maximum efficiency and performance, salt must be integrated into the core (kernel) during the duration of compilation […] This means that the kernel should be compiled at runtime by the user's system. This kind of setup with the kernel adjusting according to salt/hash is only possible if the source code is available.”
Below you will find the links λήψηof the new version of Hashcat 4.2.1:
Name | Version | Date: | Download | Signature |
---|---|---|---|---|
hashcat binaries | v4.2.1 | 2018.08.07 | Download | PGP |
hashcat sources | v4.2.1 | 2018.08.07 | Download | PGP |
Signing key on PGP keyservers: RSA, 2048-bit.
Key ID: 2048R/8A16544F.
Fingerprint: A708 3322 9D04 0B41 99CC 0052 3C17 DA8B 8A16 544F