New oclHashcat 3.20 The fastest Cracker password

New 3.20: oclHashcat is one of the fastest password cracking tools s that uses GPU to "decrypt" md5crypt, phpass, mscash2 and WPA/WPA2.

The first and only one that uses GPGPU rule .hashcat

For those of you who know the tool, and you are looking for ocleashat-plus, you should know that this version has been removed (long ago), but all of its services are available at oclashashcat.

The application runs on all versions of Windows and Linux on 32 and 64 bit.

The .gr presents this tool, to protect your systems and ONLY for this reason. We are against any kind of malicious use of the tool.

We should mention that Jens Steube, creator of the cracking tools Hashcat, announced that its application and all its derivatives, from now on will be available with open source.

"The final reason I decided to open the code was to implement bitsliced ​​DES GPU kernels," Steube tells forum on his site.

“To achieve maximum performance and performance, salt should be included in the kernel context during compilation […] This means that the kernel should be compiled at runtime by the user's system. This kind of setup with the kernel adjusting according to the salt/hash is only possible if it is s the source code.”

Below you will find the links of the new edition:

Name Version Signature Reserve
hashcat binaries v3.20 PGP 2016.12.02
hashcat sources v3.20 PGP 2016.12.02

iGuRu.gr The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new posts by email.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).