04-30-2024, 01:20 PM 
		
	
	
		I have sent a private message on this forum
	
	
	
	
	
| 
					Noob needs help cracking cheat code password
				 | 
| 
		
		
		04-30-2024, 01:20 PM 
		
	 
		I have sent a private message on this forum
	 
		
		
		04-30-2024, 04:10 PM 
		
	 
		what "fastrack.txt" do i need for this to work?
	 
		
		
		04-30-2024, 05:15 PM 
		
	 
		using https://github.com/p0dalirius/Argon2Cracker/ Code: python Argon2Cracker.py '$argon2id$v=19$m=8192,t=2,p=1$MEw0cmxLfXs5YXk2J1ZKUw$i5u5sIsMs5eITy+LzAXvKm6D9OzOVKhUqSy1mTTV/oUxJX6RPsk8OcyLbNaey9Vc6wXOhz+2+mTXILkIRzvXqA' -w ./words.txt -t 8 -vusing https://github.com/CyberKnight00/Argon2_Cracker Code: python3 crack_argon2.py -c '$argon2id$v=19$m=8192,t=2,p=1$MEw0cmxLfXs5YXk2J1ZKUw$i5u5sIsMs5eITy+LzAXvKm6D9OzOVKhUqSy1mTTV/oUxJX6RPsk8OcyLbNaey9Vc6wXOhz+2+mTXILkIRzvXqA' -w words.txtDictionary used: https://github.com/dwyl/english-words/bl.../words.txt Gonna try with a "fasttrack.txt" file I found online, otherwise I think I'm stuck 
		
		
		04-30-2024, 07:55 PM 
		
	 
		tried with https://github.com/drtychai/wordlists/bl...ttrack.txt same result. what do? 
		
		
		05-07-2024, 01:34 PM 
		
	 
		
		
		05-08-2024, 12:26 PM 
		
	 (04-30-2024, 05:15 PM)genen Wrote: using https://github.com/p0dalirius/Argon2Cracker/ ![[Image: argon2ID.png]](http://i.postimg.cc/50bwKxgp/argon2ID.png)  
		
		
		05-24-2024, 12:48 PM 
(This post was last modified: 05-24-2024, 12:50 PM by ccentr12212.)
		
	 
		Tell me, is this hash correct? Maybe it needs to be redone somehow? and is salt needed here? Code: $argon2id$v=19$m=65536,t=2,p=1$byHvfMg1T//PaE+udzRDdw$r1tO870a08rXPrjqDGiMnGGWe4bZTOPWSq9sDcAojKg:X7xe82t5LQbanOq2L8n9Owg7SHxLDprnCdCFAEgy12HjtTxFA248z7AQdDp3MF9ctjscngR7qsFDjOqS38hr4yX5P1gWhLRZXMtGHLeXXxp22An5SHgW9Egg7ahyeTtgFh
		
		
		05-26-2025, 03:48 PM 
		
	 
		anyone have any idea how to decrypt the hash bellow, its a public key. i really appreciate if anyone help to figure how to do it. Code: MIIBtzCCASwGByqGSM44BAEwggEfAoGBALrfiWweWx2aMzjoZv0ymd72bwT7KruJ
		
		
		05-26-2025, 04:05 PM 
		
	 
		Not the correct thread neivafit, also it's just a public key so there is no hash to decode. Throw your base64 data in https://asn1js.eu/ and press decode and you will see the data: Code: SubjectPublicKeyInfo SEQUENCE (2 elem) | 
| 
					« Next Oldest | Next Newest »
				 |