Dehashed Xsplit.com 2.1M records
by - Thursday, January 1, 1970 at 12:00 AM
Update: it's now at 2.49Million records. Updating the link. I can't get those last 500k users no matter what rule I try.

Xsplit.com - https://www.xsplit.com/blog/regarding-rumors-of-potential-leak-of-user-data

=> first ever share. Hopefully I'm doing it right.

I'm posting this because I see that the Xsplit.com is being shared with the SHA1 hashes (which I've also included). But 30 min with my 6900 XT dehashed retrieved 2.1M out of the 2.99M records into their respective plain text passwords.

I used some crazy hashcat rules to get about a third more than just using rockyou

Sample:



000005ca8d3fabea34dbcdefee56034527c76c92 [email protected] starocean40


00001dec292e6e5ffd6fa8ccf96809bc8f9342c7 [email protected] samae1


00001e26343439e52a82eaf762a9f4728191a7b4 [email protected] 01515525


000021d27a9ed278c5fd37770162cbe7f6e32fbd [email protected] matafaka


000035198975dfb7446788b614e7ca2673a754d1 [email protected] olympia01


00003564ff74962ae514c86a51aa43f13c01a6b7 [email protected] q2demo




Hidden Content
You must register or login to view this content.
Dark & Unclean
Reply
thank you!
Reply
(June 5, 2022, 12:36 PM)blackboar Wrote: Xsplit.com - https://www.xsplit.com/blog/regarding-rumors-of-potential-leak-of-user-data
=> first ever share. Hopefully I'm doing it right.

I'm posting this because I see that the Xsplit.com is being shared with the SHA1 hashes (which I've also included). But 30 min with my 6900 XT dehashed retrieved 2.1M out of the 2.99M records into their respective plain text passwords.



I used some crazy hashcat rules to get about a third more than just using rockyou





Sample:


000005ca8d3fabea34dbcdefee56034527c76c92 [email protected] starocean40


00001dec292e6e5ffd6fa8ccf96809bc8f9342c7 [email protected] samae1


00001e26343439e52a82eaf762a9f4728191a7b4 [email protected] 01515525


000021d27a9ed278c5fd37770162cbe7f6e32fbd [email protected] matafaka


000035198975dfb7446788b614e7ca2673a754d1 [email protected] olympia01


00003564ff74962ae514c86a51aa43f13c01a6b7 [email protected] q2demo





Great work !! Thank you for  sharing it for free :)
Reply
thanks
Reply
Good.
Reply
thanks for sharing
Reply
thanks for share this.
Reply
(June 5, 2022, 12:36 PM)blackboar Wrote: Xsplit.com - https://www.xsplit.com/blog/regarding-rumors-of-potential-leak-of-user-data
=> first ever share. Hopefully I'm doing it right.

I'm posting this because I see that the Xsplit.com is being shared with the SHA1 hashes (which I've also included). But 30 min with my 6900 XT dehashed retrieved 2.1M out of the 2.99M records into their respective plain text passwords.



I used some crazy hashcat rules to get about a third more than just using rockyou





Sample:


000005ca8d3fabea34dbcdefee56034527c76c92 [email protected] starocean40


00001dec292e6e5ffd6fa8ccf96809bc8f9342c7 [email protected] samae1


00001e26343439e52a82eaf762a9f4728191a7b4 [email protected] 01515525


000021d27a9ed278c5fd37770162cbe7f6e32fbd [email protected] matafaka


000035198975dfb7446788b614e7ca2673a754d1 [email protected] olympia01


00003564ff74962ae514c86a51aa43f13c01a6b7 [email protected] q2demo




is this fresh ? what year is this from ???
Reply
Appreciate it!
Reply
Thank you brother for sharing this i needed this old db
Reply


 Users viewing this thread: Dehashed Xsplit.com 2.1M records: No users currently viewing.