ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

[Tutorial] [Intermediate level] [New HQ Tool] How to Decrypt Hashed dumped passwords?


  • Please log in to reply
[Tutorial] [Intermediate level] [New HQ Tool] How to Decrypt Hashed dumped passwords?

#81

vidrq
vidrq
    Offline
    0
    Rep
    1
    Likes

    Advanced Member

  • PipPipPipPip
Posts: 90
Threads: 0
Joined: Apr 04, 2019
Credits: 0
Five years registered
#81

wow thanks man


  • 0

#82

thyllama
thyllama
    Offline
    0
    Rep
    1
    Likes

    Regular Person

  • PipPipPipPip
Posts: 148
Threads: 1
Joined: Jan 21, 2017
Credits: 0
Seven years registered
#82

Thanks i need this for my hashed passwords lmao 


  • 0

#83

FenElChat
FenElChat
    Offline
    0
    Rep
    1
    Likes

    Member

  • PipPipPip
Posts: 50
Threads: 1
Joined: Aug 08, 2019
Credits: 0
Five years registered
#83

I love you man


  • 0

#84

detectivecrewze
detectivecrewze
    Offline
    0
    Rep
    1
    Likes

    New Member

Posts: 22
Threads: 0
Joined: Aug 22, 2019
Credits: 0
Five years registered
#84

dont give me false hope...


  • 0

#85

DiasStuga
DiasStuga
    Offline
    0
    Rep
    0
    Likes

    Addicted

  • PipPipPipPipPip
Posts: 155
Threads: 0
Joined: Jun 18, 2019
Credits: 0
Five years registered
#85

let me learn something today


  • 0

#86

combodumitta
combodumitta
    Offline
    0
    Rep
    0
    Likes

    Advanced Member

  • PipPipPipPip
Posts: 105
Threads: 0
Joined: Aug 18, 2019
Credits: 0
Five years registered
#86

thanks for this super great information aprrecitate it


  • 0

#87

jolad
jolad
    Offline
    0
    Rep
    0
    Likes

    Lurker

Posts: 5
Threads: 0
Joined: Aug 14, 2018
Credits: 0
Six years registered
#87
Tknkyouuu

  • 0

#88

zekenbomba
zekenbomba
    Offline
    0
    Rep
    1
    Likes

    Advanced Member

  • PipPipPipPip
Posts: 75
Threads: 0
Joined: Sep 09, 2019
Credits: 0
Five years registered
#88

Hi guys...
I'm not gonna say useless stuff let's get to work...
Here at Nulled there are tens of Tutorials on how to dump databaces using the SQLi method. You can get private Combos for yourself, they say! But after days working, finally you hack a shitty site but soon you'll find out the passwords are hashed and they're useless. So how to Decrypt them?

Let's talk about Hashes first.
Read this: https://www.wired.co...assword-hashing
Now you know what hash is and how it works.
Rainbow tables are the only way to decrypt hashes. What the hell is a rainbow table?
Read this: https://en.wikipedia...i/Rainbow_table

Every one at nulled tells you to trust no one! and it's true you shouldn't trust any one (including me!). There are a lot of tools that you can use them to decrypt your hashed passwords and make yourself some good quality private combos! but there is one big big problem! What if those tools are stealing your data including your private combos, dorks, files,....? This is no joke! You may loose your hard earned private shits and it can get worse!(Knock Knock... FBI...Please open the door sir!)
Today I'm gonna introduce one simple and lightning fast tool to decrypt your hashes. What is special about it? It's Open Source. You can read its code and find out "if it's stealing your data?" for yourself. If you know python you can even edit it to make it work the way you want it to work! Long story short, pyDecryptor is a tool to decrypt your hashes using rainbow tables without worrying about loosing your data and maybe even your life!

ScreenShots:

 

 

 

 

IF you had Any question or problem with the tool, I'll be happy to help...

 thanks man


  • 0

#89

XDAAXX
XDAAXX
    Offline
    0
    Rep
    1
    Likes

    Member

  • PipPipPip
Posts: 55
Threads: 0
Joined: Sep 06, 2019
Credits: 0

Five years registered
#89

Thanksssssss


  • 0

#90

feyzuke
feyzuke
    Offline
    0
    Rep
    0
    Likes

    New Member

  • PipPip
Posts: 14
Threads: 0
Joined: Sep 18, 2019
Credits: 0
Five years registered
#90

ty


  • 0


 Users browsing this thread: