TERAHASH®

Say goodbye to frustration.

Building, operating, and maintaining a password cracking rig can rapidly become an endless timesink, a money pit, and a source of never-ending migraines. See how Terahash® is revolutionizing password cracking with the world's fastest, most powerful, and most scalable turn-key password cracking solutions.

    Learn More
Batteries Included
Unlike other vendors, we do not provide just the hardware or just the software, leaving you to struggle with the rest by yourself – all Terahash® appliances are shipped fully configured with our powerful Hashstack software preinstalled, and are ready to begin destroying password hashes out of the box.
Superior Performance
Terahash® appliances are up to 35% faster than other rigs built with comparable hardware, as our years of industry-leading experience enable us to perform tuning at all layers to wring out every last drop of performance. If you build your own rig or purchase from another vendor, you're leaving a lot of untapped potential on the table!
Powerful Software
Built upon the proven foundation of Hashcat, Terahash® Hashstack raises the stakes with native distributed support for six attack modes across 375+ GPU-accelerated formats, complex resource scheduling, project management, multi-user support, and much more. We like to think of Hashstack as "Multiplayer Hashcat on Catnip!"
Zero Maintenance
GPU rigs can be quite fragile, and there are few things more infuriating than a system update undoing all of the hard work you put into configuring one. But Terahash® appliances are smart – self-configuring and entirely self-managing – so you will never have to dread performing another maintenance task ever again.
Infinitely Stackable
Multiple Terahash® appliances can be clustered together via a Magistos cluster controller to appear as one large appliance with perfectly linear scaling. And there is virtually no limit to the number of appliances that can be stacked. So whether you require 5 GPUs or 500 GPUs, our solution can scale to meet any target – the only limit is your bank account.
Share & Collaborate
You probably aren't the only one in your org who cracks passwords; you will likely need to share your solution with your team members – maybe even multiple teams – and manually dividing resources can be a huge headache. Hashstack enables you to fairly share resources, so you can work with your team instead of against them.
  • The Inmanis

  • The Brutalis

  • The Syrenis

Hashstack

Hashcat on Catnip
  • World's most powerful password cracking software, built upon the proven foundation of Hashcat
  • Full hardware acceleration for ALL 375+ highly-optimized hash formats across six unique attack modes
  • Transparently distribute workloads across a cluster of mulitple appliances via the Magistos cluster controller with limitless linear scalability and high fault-tolerance
  • True multi-user support – crack multiple hashes per job, and multiple simultaneous jobs from multiple simultaneous users, with granular ACLs
  • Enables teams to better manage and share resources and collaborate on cases/engagements
  • First-class API empowers you to automate workflows and utilize Hashstack in ways we could never imagine
epixoip@terahash$


Hashstack is the ultimate password cracking software stack, designed and developed by the world's top password crackers for true password cracking professionals, and exclusively available on Terahash® turn-key password cracking appliances.

Optimized Workflow

Modeled after Team Hashcat's own workflows, Hashstack works the way you work and is designed with team collaboration at the forefront. Hashstack is project-centric and list-centric rather than job-centric, which means that hash lists are logically organized by case/engagement. You may then add collaborators to each hash list, optionally organized into groups/teams, so that multiple simultaneous users may work together against multiple simultaneous hash lists. And Hashstack's advanced, multi-dimensional queueing mechanism and job scheduler ensures that all resources are fairly shared across the cluster, with the option to assign job priorities and resource limits. So whether you work in law enforcement, military/defense, information security, security consulting, digital forensics, or litigation support, Hashstack provides the perfect environment for collaborative, multi-user password cracking!

Extreme Performance

Unlike other software which only supports GPU acceleration for a small subset of available hash formats, Hashstack has full GPU acceleration for ALL 375+ highly-optimized hash formats. Coupled with Terahash's® finely-tuned appliances which deliver up to 35% more performance over other solutions using similar hardware, Hashstack offers unparalleled hash cracking performance. And unlike other software that allows you to queue up a batch of multiple hashes/files but then works on them in serial – exahusting all attacks on one file before moving on to the next – Hashstack works on multiple hashes in parallel, and on multiple jobs in parallel too, enabling you to find the most passwords in the least amount of time.

Infinitely Scalablity

One Terahash® appliance is great – 20 Terahash® appliances are better! Password cracking has exponential complexity, so there's literally no such thing as having "too many" cracking resources. But password cracking is also an embarassingly parallel problem, and thus Hashstack was designed to be infinitely scalable – you can purchase and stack as many appliances as your budget permits, and Hashstack will fully utilize all of them for distributing password cracking jobs. Contrary to popular belief, the biggest advantage to operating a cluster of multiple Terahash® appliances is actually not the ability to utilize the raw compute power of all resources combined, but rather the ability to run many simultaneous jobs in parallel. Posting up 12 TH/s on NTLM is certainly impressive, but the ability to run 200 jobs in parallel is far more impressive and far more practical!

High Fault Tolerance

Hashstack is highly tolerant of failures, so having an appliance go down for any reason does not mean the jobs currently running will fail; Hashstack will simply route around the failure until the issue can be resolved. This resilience also enables you to add appliances on-the-fly as well: simply rack up a new appliance, and it will automatically join the cluster and begin work on the active jobs in the queue!


Hashstack has full hardware acceleration for the following 375+ highly-optimized hash formats.

Generic Ciphers, KDF, and Cryptographic Hash Algorithms

3DES
BLAKE2b 512
ChaCha20
CRC32
DES
GOST R 34.11-94
Half MD5
HMAC-MD5 (key=pass)
HMAC-MD5 (key=salt)
HMAC-SHA1 (key=pass)
HMAC-SHA1 (key=salt)
HMAC-SHA256 (key=pass)
HMAC-SHA256 (key=salt)
HMAC-SHA512 (key=pass)
HMAC-SHA512 (key=salt)
HMAC-Streebog-256 (key=pass)
HMAC-Streebog-256 (key=salt)
HMAC-Streebog-512 (key=pass)
HMAC-Streebog-512 (key=salt)

RIPEMD 160
Keccak 224
Keccak 256
Keccak 384
Keccak 512
MD4
MD5
MD5(MD5(pass).MD5(salt))
MD5(MD5(pass))
MD5(pass.salt)
MD5(salt.MD5(pass.salt))
MD5(salt.MD5(pass))
MD5(salt.MD5(salt.pass))
MD5(salt.pass.salt)
MD5(salt.pass)
MD5(salt.utf16le(pass))
MD5(SHA1(pass))
MD5(strtoupper(MD5(pass)))
MD5(utf16le(pass).salt)

Whirlpool
PBKDF2-HMAC-MD5
PBKDF2-HMAC-SHA1
PBKDF2-HMAC-SHA256
PBKDF2-HMAC-SHA512
SHA1
SHA1(CX)
SHA1(MD5(MD5(pass)))
SHA1(MD5(pass))
SHA1(pass.salt)
SHA1(salt.pass.salt)
SHA1(salt.pass)
SHA1(salt1.pass.salt2)
SHA1(salt.SHA1(pass))
SHA1(salt.utf16le(pass))
SHA1(SHA1(pass))
SHA1(utf16le(pass).salt)
SHA224
SHA256

SHA256(pass.salt)
SHA256(salt.pass)
SHA256(salt.utf16le(pass))
SHA256(utf16le(pass).salt)
SHA384
SHA512
SHA512(pass.salt)
SHA512(salt.pass)
SHA512(salt.utf16le(pass))
SHA512(utf16le(pass).salt)
SHA3 224
SHA3 256
SHA3 384
SHA3 512
scrypt
SipHash
Skip32
Streebog 256
Streebog 512

Operating Systems

Apple Mac OS X 10.4 – 10.6
Apple Mac OS X 10.6
Apple Mac OS X 10.7
Apple Mac OS X 10.8 – 10.14
Aruba Networks ArubaOS
BlackBerry QNX (MD5)
BlackBerry QNX (SHA256)
BlackBerry QNX (SHA512)
BSDi Crypt (Extended DES)
Cisco ASA MD5
Cisco IOS Type 4
Cisco IOS Type 5
Cisco IOS Type 8
Cisco IOS Type 9
Cisco PIX MD5

Citrix NetScaler
FortiGate FortiOS
GNU GRUB 2
IBM AIX {smd5}
IBM AIX {ssha1}
IBM AIX {ssha256}
IBM AIX {ssha512}
IBM MVS (RACF)
IBM OS/390 (RACF)
IBM z/OS (RACF)
IBM z/VM (RACF)
Juniper IVE
Juniper ScreenOS
Juniper sha1crypt
NetBSD sha1crypt

crypt(3) DEScrypt
crypt(3) md5crypt ($1$)
crypt(3) bcrypt ($2y$)
crypt(3) sha256crypt ($5$)
crypt(3) sha512crypt ($6$)
Microsoft DPAPI masterkey v1
Microsoft DPAPI masterkey v2
Microsoft Windows Cached
Microsoft Windows Cached v2
Microsoft Windows NT 3.1
Microsoft Windows NT 3.5
Microsoft Windows NT 3.51
Microsoft Windows NT 4.0
Microsoft Windows 2k
Microsoft Windows 2k Server

Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Server 2k3 R2
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7
Microsoft Windows Server 2k8 R2
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows 10
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Microsoft AzureSync
Radmin2

Full Disk Encryption

Android FDE (Samsung DEK)
Android FDE <= 4.3
Apple File System (APFS)
Apple Mac OS X FileVault2
eCryptfs
LUKS
TrueCrypt RIPE XTS 512
TrueCrypt RIPE XTS 512 BM
TrueCrypt RIPE XTS 1024
TrueCrypt RIPE XTS 1024 BM

TrueCrypt RIPE XTS 1536
TrueCrypt RIPE XTS 1536 BM
TrueCrypt SHA512 XTS 512
TrueCrypt SHA512 XTS 1024
TrueCrypt SHA512 XTS 1536
TrueCrypt Whirlpool XTS 512
TrueCrypt Whirlpool XTS 1024
TrueCrypt Whirlpool XTS 1536
VeraCrypt RIPE XTS 512
VeraCrypt RIPE XTS 512 BM

VeraCrypt RIPE XTS 1024
VeraCrypt RIPE XTS 1024 BM
VeraCrypt RIPE XTS 1536
VeraCrypt RIPE XTS 1536 BM
VeraCrypt SHA256 XTS 512
VeraCrypt SHA256 XTS 512 BM
VeraCrypt SHA256 XTS 1024
VeraCrypt SHA256 XTS 1024 BM
VeraCrypt SHA256 XTS 1536
VeraCrypt SHA256 XTS 1536 BM

VeraCrypt SHA512 XTS 512
VeraCrypt SHA512 XTS 1024
VeraCrypt SHA512 XTS 1536
VeraCrypt Streebog XTS 512
VeraCrypt Streebog XTS 1024
VeraCrypt Streebog XTS 1536
VeraCrypt Whirlpool XTS 512
VeraCrypt Whirlpool XTS 1024
VeraCrypt Whirlpool XTS 1536

Network Protocols

Database Management Systems

CRAM-MD5
DNSSEC (NSEC3)
IKE-PSK MD5
IKE-PSK SHA1
IPMI2 RAKP
iSCSI CHAP
Kerberos 5 AS-REP etype 23
Kerberos 5 AS-REQ etype 23
Kerberos 5 TGS-REP etype 23
JSON Web Token (JWT)
LDAP {SHA}
LDAP {SSHA}
LDAP {SSHA256}
LDAP {SSHA512}

Microsoft NetNTLM v1
Microsoft NetNTLM v1+ESS
Microsoft NetNTLM v2
Microsoft Skype
MSCHAP v2
SIP Digest
TACACS+
WPA-EAPOL-PBKDF2
WPA-EAPOL-PMK
WPA-PMKID-PBKDF2
WPA-PMKID-PMK

Microsoft SQL Server 2000
Microsoft SQL Server 2005
Microsoft SQL Server 2008
Microsoft SQL Server 2012
Microsoft SQL Server 2014
Microsoft SQL Server 2016
Microsoft SQL Server 2017
Oracle Database 7
Oracle Database 8/8i
Oracle Database 9i
Oracle Database 9i R2
Oracle Database 10g
Oracle Database 10g R2
Oracle Database 11g

Oracle Database 11g R2
Oracle Database 12g
Oracle Database 12g R2
Oracle Database 18c
Oracle MySQL 3.23 / 4.0
Oracle MySQL 4.1+
Oracle MySQL 5.x
Oracle MySQL 6.x
Oracle MySQL 8.x
Oracle MySQL CRAM
PostgreSQL
PostgreSQL CRAM
Sybase SQL Server
Sybase/SAP ASE

Office / Productivity Software

Adobe Acrobat 3.0
Adobe Acrobat 4.0
Adobe Acrobat 5.0
Adobe Acrobat 6.0
Adobe Acrobat 7.0
Adobe Acrobat 8.0
Adobe Acrobat 9.0
Adobe Acrobat 10.0
Adobe Acrobat 11.0
Apache OpenOffice.org 2.x
Apache OpenOffice.org 3.x
Apple Notes
IBM Lotus Domino 5.x
IBM Lotus Domino 6.x
IBM Lotus Domino 8.x
IBM Lotus Notes 5.x
IBM Lotus Notes 6.x
IBM Lotus Notes 8.x
LibreOffice 3.x
LibreOffice 4.x

LibreOffice 5.x
LibreOffice 6.x
Microsoft Excel 97
Microsoft Excel 98 (Mac)
Microsoft Excel XP
Microsoft Word 97
Microsoft Word 98 (Mac)
Microsoft Word XP
Microsoft Excel 2000
Microsoft Word 2000
Microsoft Excel 2001 (Mac)
Microsoft Word 2001 (Mac)
Microsoft Excel 2003
Microsoft Word 2003
Microsoft Excel 2004 (Mac)
Microsoft Word 2004 (Mac)
Microsoft Excel 2007
Microsoft PowerPoint 2007
Microsoft Word 2007
Microsoft Excel 2008 (Mac)

Microsoft Word 2008 (Mac)
Microsoft PowerPoint 2008 (Mac)
Microsoft Excel 2010
Microsoft Word 2010
Microsoft PowerPoint 2010
Microsoft Excel 2011 (Mac)
Microsoft Word 2011 (Mac)
Microsoft PowerPoint 2011 (Mac)
Microsoft Access 2013
Microsoft Excel 2013
Microsoft OneNote 2013
Microsoft PowerPoint 2013
Microsoft Project 2013
Microsoft Word 2013
Microsoft Access 2016
Microsoft Excel 2016
Microsoft OneNote 2016
Microsoft PowerPoint 2016
Microsoft Project 2016
Microsoft Word 2016

Microsoft Access 2016 (Mac)
Microsoft Excel 2016 (Mac)
Microsoft OneNote 2016 (Mac)
Microsoft PowerPoint 2016 (Mac)
Microsoft Project 2016 (Mac)
Microsoft Word 2016 (Mac)
Microsoft Access 2019
Microsoft Excel 2019
Microsoft OneNote 2019
Microsoft PowerPoint 2019
Microsoft Project 2019
Microsoft Word 2019
Microsoft Access 2019 (Mac)
Microsoft Excel 2019 (Mac)
Microsoft OneNote 2019 (Mac)
Microsoft PowerPoint 2019 (Mac)
Microsoft Project 2019 (Mac)
Microsoft Word 2019 (Mac)

Enterprise Applications

Server Software

Crypto Wallets

Atlassian Bamboo
Atlassian BitBucket
Atlassian Confluence
Atlassian Crucible
Atlassian Fisheye
Atlassian HipChat/Stride
Atlassian Jira
Java Object hashCode()

Oracle PeopleSoft
Oracle PeopleSoft PS_TOKEN
RedHat Ansible Vault
SAP BCODE
SAP BCODE from TABLE
SAP PASSCODE
SAP PASSCODE from TABLE
SAP PWDSALTEDHASH iSSHA-1

Apache APR htpasswd (SHA1)
Apache APR htpasswd (bcrypt)
Apache APR htpasswd (MD5)
Apache APR htpasswd (DEScrypt)
ColdFusion 10+
Dovecot (CRAM MD5)
FileZilla Server >= 0.9.55
hMailServer

Bitcoin/Litecoin wallet.dat
Blockchain.info My Wallet
Blockchain.info Second Password
Blockchain.info My Wallet v2
Electrum Wallet
Ethereum Pre-Sale Wallet
Ethereum Wallet, pbkdf2 KDF
Ethereum Wallet, scrypt KDF

Web Applications

Password Managers

Django (PBKDF2-SHA256)
Django (SHA-1)
Drupal 7.x
Episerver CMS 6.x < .NET 4
Episerver CMS 6.x >= .NET 4
Imageboard Tripcodes
Invision Power Board (IPB) >= v2
Joomla

MediaWiki B type
MyBB >= v1.2
OpenCart
osCommerce
phpass
PHPS
PrestaShop
PunBB

Redmine
RoR Restful-Auth
Simple Machines Forum > v1.1
TOTP (HMAC-SHA1)
vBulletin < v3.8.5
vBulletin >= v3.8.5
Woltlab Burning Board 3 (WBB3)
xt:Commerce

1Password, Agile Keychain format
1Password, OPVault format
Java Key Store (JKS) Private Key
KeePass v1
KeePass v2
LastPass
Password Safe v2
Password Safe v3

Archive Utilities

Mobile Devices

 

7-Zip
AxCrypt
AxCrypt in-memory SHA1
RAR 2.9 – 4.x
RAR 5.x
WinZIP 9.0+

Apple iTunes Backup (iOS 4-9)
Apple iTunes Backup (iOS 10+)
Samsung Android PIN/Password
Windows Phone 8+ PIN/Password
Android Backup