Cracking your hashed databases
by - Thursday, January 1, 1970 at 12:00 AM
If you've got a database with hashed passwords you want cracked, feel free to leave them below so that either I or someone else in the community can try cracking your hashes for you.

If you don't want to share the database publicly, you can privately message me.

Please, no personal hashes (i.e just one or two hashes) this is for large datasets of hashed passwords.
 - I won't be cracking wallet hashes, bcrypt, WPA/WPA2 or scrypt.
I need me a bitch who knows how to take a fall down the stairs without blabbing.


[#BF] [Mod] dedale: seems like they are multi accounting
[#BF] [Mod] dedale: and spamming

Reply
database management system users password hashes:
[*] adam [1]:
password hash: NULL
[*] asia-live-live-user-20220125 [1]:
password hash: *5E6A3B2DA2690AF05B36F8B77E5D49578A99CED3
[*] db_standard_user [1]:
password hash: NULL
[*] edvjob [1]:
password hash: *D22818E29C142FDDEB894A54AAD3DD3B4727083C
[*] eewoon [1]:
password hash: NULL
[*] faizal [1]:
password hash: *509136C5CD3248C47B75587674258B066675E52E
[*] mysql.session [1]:
password hash: *THISISNOTAVALIDPASSWORDTHATCANBEUSEDHERE
[*] mysql.sys [1]:
password hash: *THISISNOTAVALIDPASSWORDTHATCANBEUSEDHERE
[*] rdsadmin [1]:
password hash: *D64CEE20C051895ECDC223127BE165C71F21034D
[*] rdsrepladmin [1]:
password hash: NULL
[*] s_b_admin_srv [1]:
password hash: NULL
[*] sb-payments [1]:
password hash: *E448F3AA9D4C033511B7588E19F57196550EFC9A
[*] sb_gs [1]:
password hash: A
[*] sb_gs_2020 [1]:
password hash: NULL
[*] sb_phpmyadmin [1]:
password hash: NULL
[*] sbadmin [1]:
password hash: *158E9C6035E4004BDBA75335575176F6A21564F3
[*] sbaffiliate [1]:
password hash: NULL
[*] sbapi [1]:
password hash: *DD680C99B6FF031B3100CE06F80FBA5E5C6F0F04
[*] sbstaging [1]:
password hash: *FC47B8E08F6E21ADB48A8E5E2843F0DC43753F77
[*] sbweb [1]:
password hash: *514FFE7EC8BEF7734A8C12C1EC38E64B768F34B9
[*] sbwpblog [1]:
password hash: NULL
[*] sgrbook_ds [1]:
password hash: NULL
[*] spi-sgrbk-com [1]:
password hash: *129D0FD65289D35CEF64BE3570DECBA2BF3D019C
[*] sugarbook-backend [1]:
password hash: *AA064F7609B1468A8DEAFAC2CA226903B11A678C
[*] support [1]:
password hash: NULL
[*] tsbadminlo [1]:
password hash: *280B7EC92B2C0BDBB165A8D3C36BAB1A5298D262
[*] tsbadminlo2 [1]:
password hash: NULL
[*] tsbapp [1]:
password hash: *418523CDBC0272686E186A4B0F0ECE05AAD5AA5B
[*] tsbcom [1]:
password hash: *CA7186760247E60DA4B1BE9F4F2D3C429C870696
[*] weiqian [1]:
password hash: NULL
[*] wp [1]:
password hash: *041DCD8B2E8364901CEA6B32F5069FCB9F2F6A12
Reply
(April 4, 2022, 12:01 PM)script_kidd69 Wrote: database management system users password hashes:


You did exactly what he said not to do, congratulations.

#databreach
#RIU
Reply
(April 4, 2022, 03:40 PM)thekilob Wrote:
(April 4, 2022, 12:01 PM)script_kidd69 Wrote: database management system users password hashes:


You did exactly what he said not to do, congratulations.


lmao idc i just want to crack the hash its not pravite
Reply
(April 4, 2022, 03:43 PM)script_kidd69 Wrote:
(April 4, 2022, 03:40 PM)thekilob Wrote:
(April 4, 2022, 12:01 PM)script_kidd69 Wrote: database management system users password hashes:


You did exactly what he said not to do, congratulations.


lmao idc i just want to crack the hash its not pravite


Die. Stop derailing this thread BTW.

#databreach
#RIU
Reply


 Users viewing this thread: Cracking your hashed databases: No users currently viewing.