Documentation Index
Fetch the complete documentation index at: https://wiki.krkn.tech/llms.txt
Use this file to discover all available pages before exploring further.

Hashcrack.ing — Hash Cracking Platform
Hashcrack.ing is an invitation-only platform for sharing cracked and uncracked password hashes, wordlists, optimized rulesets, and hash cracking tools. Built for cybersecurity professionals, researchers, and offensive security practitioners.What Hashcrack.ing Does
| Feature | Description |
|---|---|
| Hash Database | Structured hash storage by format, type, and target with plaintext lookups |
| Hash Search | Single, bulk, and file-based hash lookups against the shared database |
| Hash Submission | Upload cracked hashes to contribute to the community database |
| Wordlists | Upload, download, and share password wordlists |
| Rulesets | Share optimized Hashcat rule files |
| Hash Lists | Upload and monitor hash lists for collaborative cracking |
| Hash Identification | Automatic hash type detection (500+ Hashcat format definitions) |
| Secrets Dump Parser | Parse Windows secretsdump.py output (SAM, DCC2, LSA, DPAPI, Kerberos) |
| Leaderboard | Track contributor rankings by submissions |
| Discord Integration | Bot commands, alerts, approval workflows, real-time crack notifications |
Feature Overview
Search & Submit
Hash lookup, bulk search, file upload, cracked hash submission
Resources
Wordlists, rulesets, hash lists, and monitoring
Tools
Hash identification, secretsdump parser, potfile processing
Platform Overview
Hashcrack.ing operates as a community-driven hash intelligence platform:- Invitation-only access — new users must receive a registration token from an admin or existing member
- Quality control — uploads are processed asynchronously with format validation and deduplication
- Structured storage — hashes are stored with Hashcat type codes, metadata tags, and plaintext associations
- Collaborative cracking — upload uncracked hash lists, monitor progress, and receive notifications when hashes are cracked
- Contributor tracking — leaderboard ranks users by submission volume and quality
Security Model
| Layer | Protection |
|---|---|
| Registration | Invitation-only with expiring registration tokens |
| Password | Minimum 20 characters |
| MFA | TOTP-based multi-factor authentication (enforced) |
| Passkeys | WebAuthn/FIDO2 passwordless authentication support |
| Sessions | Token-based with MFA verification state tracking |
| API Keys | Separate keys for CLI, API, and Discord integration |
| Access Control | Role-based ACL (admin, member, contributor) |
| Account Lockout | Automatic lockout after failed authentication attempts |
| Email Verification | Required for account activation |

