New version (1.01) of oclHashcat. Download the fastest password Cracker

oclHashcat is one of the fastest password cracker that uses GPU to "decrypt" md5crypt, phpass, mscash2 and WPA/WPA2.

oclhashcat

Those of you who know the tool and look for it oclHashcat-plus, you should know that particular version has been abolished but all of its services are in oclHashcat. The application runs on all versions of Windows and Linux on 32 and 64 bit.

The presents this particular tool, to protect your systems and for that reason ONLY. We are against any kind of malicious use of the tool.

Download latest version

Name Version md5sum Date
oclHashcat v1.01 6dcc0e5107c3a7fc4b5013e032829d70 2014.01.01

GPU Driver requirements:

  • For systems with NV, ForceWare 319.37 or larger version is required
  • For systems with AMD, you need Catalyst 13.12

Specifications

  • Worlds fastest password cracker
  • Worlds first and only GPGPU based rule engine
  • Free
  • Multi-GPU (up to 128 gpus)
  • Multi-Hash (up to 15 million hashes)
  • Multi-OS (Linux & Windows native binaries)
  • Multi-Platform (OpenCL & CUDA support)
  • Multi-Algo (see below)
  • Low resource utilization, you can still watch movies or play games while cracking
  • Focuses highly iterated modern hashes
  • Focuses dictionary based attacks
  • Supports distributed cracking
  • Supports pause / summarizes while cracking
  • Supports sessions
  • Supports restore
  • Supports reading words from fillet
  • Supports reading words from stdin
  • Supports hex-salt
  • Supports hex-charset
  • Built-in benchmarking system
  • thermal watchdog
  • 80 + Algorithms implemented with performance in mind
  • ... and much more

Algorithms

  • MD5
  • md5 ($ pass. $ salt)
  • md5 ($ salt. $ pass)
  • md5 (unicode ($ pass) $ salt)
  • md5 ($ salt.unicode ($ pass))
  • HMAC-MD5 (key = $ pass)
  • HMAC-MD5 (key = $ salt)
  • SHA1
  • sha1 ($ pass. $ salt)
  • sha1 ($ salt. $ pass)
  • sha1 (unicode ($ pass) $ salt)
  • sha1 ($ salt.unicode ($ pass))
  • HMAC-SHA1 (key = $ pass)
  • HMAC-SHA1 (key = $ salt)
  • sha1 (LinkedIn)
  • MySQL
  • phpass, MD5 (WordPress), MD5 (phpBB3)
  • md5crypt, MD5 (Unix), FreeBSD MD5, Cisco-IOS MD5
  • MD4
  • NTLM
  • Domain Cached Credentials, mscash
  • SHA256
  • sha256 ($ pass. $ salt)
  • sha256 ($ salt. $ pass)
  • sha256 (unicode ($ pass) $ salt)
  • sha256 ($ salt.unicode ($ pass))
  • HMAC-SHA256 (key = $ pass)
  • HMAC-SHA256 (key = $ salt)
  • desrypt, DES (Unix), Traditional DES
  • md5apr1, MD5 (APR), Apache MD5
  • SHA512
  • sha512 ($ pass. $ salt)
  • sha512 ($ salt. $ pass)
  • sha512 (unicode ($ pass) $ salt)
  • sha512 ($ salt.unicode ($ pass))
  • HMAC-SHA512 (key = $ pass)
  • HMAC-SHA512 (key = $ salt)
  • sha512crypt, SHA512 (Unix)
  • Domain Cached Credentials2, mscash2
  • Cisco-PIX MD5
  • WPA / WPA2
  • Double MD5
  • LM
  • Oracle 7-10g, DES (Oracle)
  • bcrypt, blowfish (OpenBSD)
  • SHA-3 (Keccak)
  • Half MD5
  • Password Safe SHA-256
  • IKE-PSK MD5
  • IKE-PSK SHA1
  • NetNTLMv1-VANILLA / NetNTLMv1 + ESS
  • NetNTLMv2
  • Cisco-IOS SHA256
  • Samsung Android Password / PIN
  • RipeMD160
  • Whirlpool
  • TrueCrypt 5.0 + PBKDF2-HMAC-RipeMD160
  • TrueCrypt 5.0 + PBKDF2-HMAC-SHA512
  • TrueCrypt 5.0 + PBKDF2-HMAC-Whirlpool
  • TrueCrypt 5.0 + PBKDF2-HMAC-RipeMD160 boot-mode
  • AIX {smd5}
  • AIX {ssha256}
  • AIX {ssha512}
  • 1Password
  • AIX {ssha1}
  • GOST R 34.11-94
  • OSX v10.8
  • GRUB 2
  • sha256crypt, SHA256 (Unix)
  • Kerberos 5 AS-REQ Pre-Authentication 23
  • Joomla
  • osCommerce, xt: Commerce
  • nsldap, SHA-1 (Base64), Netscape LDAP SHA
  • nsldaps, SSHA-1 (Base64), Netscape LDAP SSHA
  • Oracle 11g
  • SMF> v1.1
  • OSX v10.4, v10.5, v10.6
  • MSSQL (2000)
  • MSSQL (2005)
  • EPiServer 6.x> v4
  • SSHA-512 (Base64), LDAP {SSHA512}
  • OSX v10.7
  • MSSQL (2012)
  • vBulletin> v3.8.5
  • IPB2 +, MyBB1.2 +

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).