#_shellntel Blog logo
#_shellntel Blog
Subscribe
  • #_shellntel Blog
  • Topics
  • Cracking

Cracking

Hash and Password Cracking

BackdoorsProgrammingdropboxValidationScrapingRaspberry PiCrackingPhysical PentestLSASSActive DirectoryPost-ExploitationScopeScanningAD CSTapEC2AWSToolsInitial AccessBrowser HackingLearnCybersecurityWeb AppProxy CannonOffensive SecurityRootkitAV BypassPwnagotchiDroneRustEscalationVPNReportingWireguardWi-FiCredit Card FraudSnifferPowershellCons
CrackingCracking
Substring Analysis
Jan 30, 2025

Substring Analysis

Uncovering Systematic Password Weaknesses

Brian Judd
Brian Judd
CrackingCracking
+1+1
Hash Master 1000
Jan 22, 2025

Hash Master 1000

A Modern Password Analysis Tool

Brian Judd
Brian Judd
CrackingCracking
Password Hash Cracking with the NVIDIA RTX 4090
Nov 01, 2022

Password Hash Cracking with the NVIDIA RTX 4090

Brian Judd
Brian Judd
CrackingCracking
Why 14 Characters?
May 16, 2019

Why 14 Characters?

Brian Judd
Chad Finkenbiner
Brian Judd, +1
CrackingCracking
How to Build a (2nd) 8 GPU Password Cracker
Feb 20, 2019

How to Build a (2nd) 8 GPU Password Cracker

Brian Judd
Brian Judd
CrackingCracking
How to build a 8 GPU password cracker
Feb 14, 2017

How to build a 8 GPU password cracker

Casey Cammilleri
Casey Cammilleri
Research, tools, and tales

#_shellntel Blog

Research, tools, and tales

Home

Posts

Authors

SynerComm Website

Adversary Simulation (AdSim)

Application Assessments

Penetration Testing

Continuous Penetration Testing

SynerComm Website

© 2025 SynerComm, Inc..

Privacy policy

Terms of use