Trixy
Forum Architect
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
100 XP
Hi guys...
I'm not gonna say useless stuff let's get to work...
Here at Nulled there are tens of Tutorials on how to dump databaces using the SQLi method. You can get private Combos for yourself, they say! But after days working, finally you hack a shitty site but soon you'll find out the passwords are hashed and they're useless. So how to Decrypt them?
Let's talk about Hashes first.
Read this: https://wired.com/2016/06/hacker-lexicon-password-hashing/
Now you know what hash is and how it works.
Rainbow tables are the only way to decrypt hashes. What the hell is a rainbow table?
Read this: https://en.wikipedia.org/wiki/Rainbow_table
Every one at nulled tells you to trust no one! and it's true you shouldn't trust any one (including me!). There are a lot of tools that you can use them to decrypt your hashed passwords and make yourself some good quality private combos! but there is one big big problem! What if those tools are stealing your data including your private combos, dorks, files,....? This is no joke! You may loose your hard earned private shits and it can get worse!(Knock Knock... FBI...Please open the door sir!)
Today I'm gonna introduce one simple and lightning fast tool to decrypt your hashes. What is special about it? It's Open Source. You can read its code and find out "if it's stealing your data?" for yourself. If you know python you can even edit it to make it work the way you want it to work! Long story short, pyDecryptor is a tool to decrypt your hashes using rainbow tables without worrying about loosing your data and maybe even your life!
1. Download it from
or from it's github page:
VirusTotal Scan result: https://www.virustotal.com/#/file/d...476914d443b6aed2d5a93e9e086ead81c96/detection
2. Install Python3 on your system. for linux users you probably have it installed already! For windows and OSX users you can Download ind install it from its official site: https://www.python.org/downloads/
Installing is simple and stright forward... and you can always use google to get help!
3. Extract the downloded pyDecryptor-master.zip file. In linux or OSX open terminal. If you have windows open start and search for cmd and open it.
4. If you dump databases using SQLi Dumper, when you wanna save your hashed dumped user passwords select comma (,) as seperator and save it as a .csv file. so you have something like user,hashedpassword in your saved file.
5. Go to the folder which you extracted it in step 3. Here you see some folders. Two of them are important:
import: every file that you want the tool to use them should be put in this folder.
export: the final unhashed (user:password)s will be save in this folder.
6. Copy your .csv file (that you created in step 4) to import folder.
Copy your .txt file (containing common passwords (to make a rainbow table from them)) to import folder
7. use cd command to go to the pyDecryptor directory: for example if the file is extracted in your download folder; In windows the command would be something like this:
8. Now simply enter this command:
or if that doesn't work you can try:
9. now you can see the menu. Type 1 and press the enter key.
10. Type the name of your .csv which you copied to import folder in step 6 and press enter.
11. Type the name of your .txt which you copied to import folder in step 6 and press enter.
12. Select the hash algorithm that your dumped passwords were hashed with it. (there are a lot of sites that can tell you which type of hash it is)
13. Finally enter a name to save your unhashed dumped passwords. for example result.txt and press enter.
14. You're done! go grab your unhashed private Combo from the export folder.
15. Spread the love and share the tool with your friends.
16. Donate some money to help develop the tool if you can.
ScreenShots:
The dumped user,hashed passwords:
import and export folders we talked about in step 5:
Steps 4 to 10:
The final export folder:
Unhashed Username:passwords
IF you had Any question or problem with the tool, I'll be happy to help...
Edited by KnigtFr0mH3ll, 01 April 2018 - 06:25 PM.
I'm not gonna say useless stuff let's get to work...
Here at Nulled there are tens of Tutorials on how to dump databaces using the SQLi method. You can get private Combos for yourself, they say! But after days working, finally you hack a shitty site but soon you'll find out the passwords are hashed and they're useless. So how to Decrypt them?
Let's talk about Hashes first.
Read this: https://wired.com/2016/06/hacker-lexicon-password-hashing/
Now you know what hash is and how it works.
Rainbow tables are the only way to decrypt hashes. What the hell is a rainbow table?
Read this: https://en.wikipedia.org/wiki/Rainbow_table
Every one at nulled tells you to trust no one! and it's true you shouldn't trust any one (including me!). There are a lot of tools that you can use them to decrypt your hashed passwords and make yourself some good quality private combos! but there is one big big problem! What if those tools are stealing your data including your private combos, dorks, files,....? This is no joke! You may loose your hard earned private shits and it can get worse!(Knock Knock... FBI...Please open the door sir!)
Today I'm gonna introduce one simple and lightning fast tool to decrypt your hashes. What is special about it? It's Open Source. You can read its code and find out "if it's stealing your data?" for yourself. If you know python you can even edit it to make it work the way you want it to work! Long story short, pyDecryptor is a tool to decrypt your hashes using rainbow tables without worrying about loosing your data and maybe even your life!
1. Download it from
You must upgrade your account or reply in the thread to view the hidden content.
You must upgrade your account or reply in the thread to view the hidden content.
2. Install Python3 on your system. for linux users you probably have it installed already! For windows and OSX users you can Download ind install it from its official site: https://www.python.org/downloads/
Installing is simple and stright forward... and you can always use google to get help!
3. Extract the downloded pyDecryptor-master.zip file. In linux or OSX open terminal. If you have windows open start and search for cmd and open it.
4. If you dump databases using SQLi Dumper, when you wanna save your hashed dumped user passwords select comma (,) as seperator and save it as a .csv file. so you have something like user,hashedpassword in your saved file.
5. Go to the folder which you extracted it in step 3. Here you see some folders. Two of them are important:
import: every file that you want the tool to use them should be put in this folder.
export: the final unhashed (user:password)s will be save in this folder.
6. Copy your .csv file (that you created in step 4) to import folder.
Copy your .txt file (containing common passwords (to make a rainbow table from them)) to import folder
7. use cd command to go to the pyDecryptor directory: for example if the file is extracted in your download folder; In windows the command would be something like this:
Code:
cd C:\Users\username\Download\pyDecryptor-master\
Code:
python3 menu.py
Code:
python menu.py
10. Type the name of your .csv which you copied to import folder in step 6 and press enter.
11. Type the name of your .txt which you copied to import folder in step 6 and press enter.
12. Select the hash algorithm that your dumped passwords were hashed with it. (there are a lot of sites that can tell you which type of hash it is)
13. Finally enter a name to save your unhashed dumped passwords. for example result.txt and press enter.
14. You're done! go grab your unhashed private Combo from the export folder.
15. Spread the love and share the tool with your friends.
16. Donate some money to help develop the tool if you can.
ScreenShots:
The dumped user,hashed passwords:
import and export folders we talked about in step 5:
Steps 4 to 10:
The final export folder:
Unhashed Username:passwords
IF you had Any question or problem with the tool, I'll be happy to help...
Edited by KnigtFr0mH3ll, 01 April 2018 - 06:25 PM.