Waraxe IT Security Portal
Login or Register
October 13, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 115
Members: 0
Total: 115
Full disclosure
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
libgeotiff 1.7.4 Heap Buffer Overflow in geotifcp (libgeotiff) During 8-to-4 Bit Downsample with Odd Image Width
APPLE-SA-09-29-2025-6 visionOS 26.0.1
APPLE-SA-09-29-2025-5 macOS Sonoma 14.8.1
APPLE-SA-09-29-2025-4 macOS Sequoia 15.7.1
APPLE-SA-09-29-2025-3 macOS Tahoe 26.0.1
APPLE-SA-09-29-2025-2 iOS 18.7.1 and iPadOS 18.7.1
APPLE-SA-09-29-2025-1 iOS 26.0.1 and iPadOS 26.0.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 6 matches
vBulletin Hash Cracking Request [$5 Reward]
PostForum:MD5 hashes Posted: Tue Aug 21, 2012 3:28 am Subject: vBulletin Hash Cracking Request [$5 Reward]
abilityfun
Replies: 1
Views: 6043




If you crack this hash, I will give you a $5 reward through PayPal, guaranteed.

Hash: 1ea8465b8397f6ed95e638de3ad7d916
Salt: i?cG[gv`1,D46+];1MuBbs(bMTz1_f
vBulletin Hash Request
PostForum:MD5 hashes Posted: Mon Aug 08, 2011 7:37 pm Subject: vBulletin Hash Request
abilityfun
Replies: 0
Views: 5003




All help is appreciated, I have tried and failed on my own. Here are the hashes, the format is hash:slat.

bfd9bfa343f4c0afc7e91801aac99dc0:l#hY_~>8v<j_6V}<E5yK/&{WYFN5=w ...
vBulletin 4 Hash Requests
PostForum:MD5 hashes Posted: Wed Jul 27, 2011 1:51 pm Subject: vBulletin 4 Hash Requests
abilityfun
Replies: 7
Views: 10752




Bump. I edited the original topic. Can someone please help crack the remaining hashes Laughing.
vBulletin 4 Hash Requests
PostForum:MD5 hashes Posted: Sat Jul 23, 2011 1:36 pm Subject: vBulletin 4 Hash Requests
abilityfun
Replies: 7
Views: 10752




Thank you so much, if you get three more, please send me a PayPal email where I can send you some moolah Twisted Evil
vBulletin 4 Hash Requests
PostForum:MD5 hashes Posted: Sat Jul 23, 2011 3:03 am Subject: vBulletin 4 Hash Requests
abilityfun
Replies: 7
Views: 10752




Yes the last salt is correct. Thank you so much! I really appreciate the help you have given me. Please crack the others, if you do, I will be more than happy to send a couple dollars your way.

One ...
vBulletin 4 Hash Requests
PostForum:MD5 hashes Posted: Fri Jul 22, 2011 5:37 pm Subject: vBulletin 4 Hash Requests
abilityfun
Replies: 7
Views: 10752




The format is hash:salt. I have been unsuccessful in my endeavors and any outside help would be greatly appreciated.

bfd9bfa343f4c0afc7e91801aac99dc0:l#hY_~>8v<j_6V}<E5yK/& ...
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.046 Seconds