Waraxe IT Security Portal
Login or Register
December 26, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 71
Members: 0
Total: 71
Full disclosure
Defense in depth -- the Microsoft way (part 94): SAFER (SRPv1and AppLocker alias SRPv2) bypass for dummies
Backdoor.Win32.ControlTot al.t / Insecure Credential Storage /MVID-2025-0702
HEUR.Backdoor.Win32.Poiso n.gen / Arbitrary Code Execution /MVID-2025-0701
CyberDanube Security Research 20251215-0 | Multiple Vulnerabilities in Phoenix Contact FL Switch Series
[KIS-2025-09] Control Web Panel <= 0.9.8.1208 (admin/index.php) OS Command Injection Vulnerability
Raydium CP Swap: Unchecked Account Allows Creator Fee Hijacking
[CFP] Security BSidesLjubljana 0x7EA | March 13, 2026
[KIS-2025-08] 1C-Bitrix <= 25.100.500 (Translate Module) Remote Code Execution Vulnerability
[KIS-2025-07] Bitrix24 <= 25.100.300 (Translate Module) Remote Code Execution Vulnerability
nopCommerce 4.90.0 is vulnerable to Cross Site Request Forgery (CSRF) via the Schedule Tasks functionality
nopCommerce 4.90.0 is vulnerable to Cross Site Scripting (XSS) in the product management functionality
nopCommerce 4.90.0 is vulnerable to Cross Site Scripting (XSS) via the Currencies functionality.
nopCommerce 4.90.0 is vulnerable to Cross Site Scripting (XSS) via the Blog posts functionality in the Content Management area
nopCommerce 4.90.0 is vulnerable to Cross Site Scripting (XSS) via the Attributes functionality
Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 91 matches
joomla hash (md5+salt) Need to crack !! who are boss?
PostForum:MD5 hashes Posted: Sun Oct 26, 2014 10:32 pm Subject: joomla hash (md5+salt) Need to crack !! who are boss?
cr4ps
Replies: 0
Views: 11150




7bea0b406bc7d4fdca4dcdbfcb1f5eb2:H5BibKf5lSMWLu1K6FHVwIqvVGEwhUFE

4df7fd11965981a9d5589689327313da:2Ey844V7o28nTgqTvFo1o23QohMOhiGl

thank's Razz
wp hash
PostForum:All other hashes Posted: Sun Oct 26, 2014 10:26 pm Subject: wp hash
cr4ps
Replies: 1
Views: 12298




Mon frere, Tu date <3 ^^
Hash for MyBB a favor please?
PostForum:MD5 hashes Posted: Tue Feb 25, 2014 1:22 pm Subject: Hash for MyBB a favor please?
cr4ps
Replies: 1
Views: 11398




Hi,

please decode for me this hash Smile

dfca80e2060d74999b7c8bfa749f60ae

It's from mybb forum.

thank's
Need to crack
PostForum:All other hashes Posted: Sun Nov 10, 2013 3:39 am Subject: Need to crack
cr4ps
Replies: 0
Views: 7579




hashe need to crack plz

nb6qqcXlwXYQY


thanks Cool
Joomla 1.5.26 Exploits
PostForum:Sql injection Posted: Fri Oct 25, 2013 10:34 pm Subject: Joomla 1.5.26 Exploits
cr4ps
Replies: 1
Views: 14834




http://www.youtube.com/watch?v=Dw5rRHXZ29A
Please Help Me-Please...MD5(MD5(Password))
PostForum:MD5 hashes Posted: Fri Oct 25, 2013 10:31 pm Subject: Please Help Me-Please...MD5(MD5(Password))
cr4ps
Replies: 3
Views: 10497




03d55eb00a51c7992c9e4778e5776970 = MY89SiceJ4

a9a690c50e42213a481d1dc422d02524 = 8586ef0fd52a5e4faefc9d5244f7bc94
SQLI Challenge
PostForum:Suggestions Posted: Fri Oct 25, 2013 10:13 pm Subject: SQLI Challenge
cr4ps
Replies: 0
Views: 8020




Hello

Sql Injection Challenge here

http://ctf.notsosecure.com/71367217217126217712/
IPB 3.2.1 admin controll
PostForum:Invision Power Board Posted: Wed Jul 03, 2013 12:05 pm Subject: Re: IPB 3.2.1 admin controll
cr4ps
Replies: 1
Views: 17114




Useing exploit, read in this forum I can reed all database of IPB 3.2.1. But I want to get admin control. This forum is not already used, and so no admins enter in it. It seems, that admin password is ...
Hash Very Important !!
PostForum:MD5 hashes Posted: Wed Jul 03, 2013 11:59 am Subject: Hash Very Important !!
cr4ps
Replies: 0
Views: 7466




How can crack this hash for me plz


password_hash
0dd133e9eea38ba5b8b4112c6019d9a9

password_salt
4c23186acada0f72a0252263711f3d58

Thanks a lot for any help Smile
Need Help
PostForum:Sql injection Posted: Wed Jun 26, 2013 10:57 am Subject: Need Help
cr4ps
Replies: 1
Views: 11396




hello waraxe... Razz
hello all... Razz

what can i do with this Error :

Warning: mysql_result(): Unable to jump to row 0 on MySQL result index 8 in /site/www/XXXX/karaoke/carte ...
Md5 Need To crack !!
PostForum:MD5 hashes Posted: Wed Jun 26, 2013 10:51 am Subject: Md5 Need To crack !!
cr4ps
Replies: 2
Views: 9516




hello waraxe... Razz
hello all... Razz

Ho can crack this Md5 for me?


admin e697a1e8ce02557a899e0214aaa6e1e1
root 7e5e0bc52cb83c531707c53da4940a12


thank's
Zip need to crack
PostForum:All other hashes Posted: Sun Jun 23, 2013 5:52 pm Subject: Zip need to crack
cr4ps
Replies: 0
Views: 7559




Ho can get this zip password for me plz Cool

http://www.sendspace.com/file/zuq7kf

thank's
MD5 Need to crack !!
PostForum:MD5 hashes Posted: Mon Apr 01, 2013 11:33 am Subject: MD5 Need to crack !!
cr4ps
Replies: 0
Views: 7295




MD5 Need to crack !!

3a223d9286a63203a65cb54fd3c49d89

Thank's
MD5 Need to crack !!
PostForum:MD5 hashes Posted: Thu Jan 10, 2013 5:29 pm Subject: MD5 Need to crack !!
cr4ps
Replies: 1
Views: 8457




MD5 Need to crack !!

3a223d9286a63203a65cb54fd3c49d89

Thank's
MD5 need to crack
PostForum:MD5 hashes Posted: Wed Jan 04, 2012 10:44 pm Subject: MD5 need to crack
cr4ps
Replies: 0
Views: 5917




admin 13ef35e91ec79e0b1361cbd13ee318e2 -JP
Page 1 of 7 Goto page 1, 2, 3, 4, 5, 6, 7Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.038 Seconds