Unpacking Software Livestream

Join our monthly Unpacking Software livestream to hear about the latest news, chat and opinion on packaging, software deployment and lifecycle management!

Learn More

Chocolatey Product Spotlight

Join the Chocolatey Team on our regular monthly stream where we put a spotlight on the most recent Chocolatey product releases. You'll have a chance to have your questions answered in a live Ask Me Anything format.

Learn More

Chocolatey Coding Livestream

Join us for the Chocolatey Coding Livestream, where members of our team dive into the heart of open source development by coding live on various Chocolatey projects. Tune in to witness real-time coding, ask questions, and gain insights into the world of package management. Don't miss this opportunity to engage with our team and contribute to the future of Chocolatey!

Learn More

Calling All Chocolatiers! Whipping Up Windows Automation with Chocolatey Central Management

Webinar from
Wednesday, 17 January 2024

We are delighted to announce the release of Chocolatey Central Management v0.12.0, featuring seamless Deployment Plan creation, time-saving duplications, insightful Group Details, an upgraded Dashboard, bug fixes, user interface polishing, and refined documentation. As an added bonus we'll have members of our Solutions Engineering team on-hand to dive into some interesting ways you can leverage the new features available!

Watch On-Demand
Chocolatey Community Coffee Break

Join the Chocolatey Team as we discuss all things Community, what we do, how you can get involved and answer your Chocolatey questions.

Watch The Replays
Chocolatey and Intune Overview

Webinar Replay from
Wednesday, 30 March 2022

At Chocolatey Software we strive for simple, and teaching others. Let us teach you just how simple it could be to keep your 3rd party applications updated across your devices, all with Intune!

Watch On-Demand
Chocolatey For Business. In Azure. In One Click.

Livestream from
Thursday, 9 June 2022

Join James and Josh to show you how you can get the Chocolatey For Business recommended infrastructure and workflow, created, in Azure, in around 20 minutes.

Watch On-Demand
The Future of Chocolatey CLI

Livestream from
Thursday, 04 August 2022

Join Paul and Gary to hear more about the plans for the Chocolatey CLI in the not so distant future. We'll talk about some cool new features, long term asks from Customers and Community and how you can get involved!

Watch On-Demand
Hacktoberfest Tuesdays 2022

Livestreams from
October 2022

For Hacktoberfest, Chocolatey ran a livestream every Tuesday! Re-watch Cory, James, Gary, and Rain as they share knowledge on how to contribute to open-source projects such as Chocolatey CLI.

Watch On-Demand

Downloads:

283

Downloads of v 1.0:

283

Last Update:

03 Mar 2021

Package Maintainer(s):

Software Author(s):

  • Justaus3r

Tags:

hashes crack sam-file command-line

Hash-R

  • 1
  • 2
  • 3

1.0 | Updated: 03 Mar 2021

Downloads:

283

Downloads of v 1.0:

283

Maintainer(s):

Software Author(s):

  • Justaus3r

Hash-R 1.0

Legal Disclaimer: Neither this package nor Chocolatey Software, Inc. are affiliated with or endorsed by Justaus3r. The inclusion of Justaus3r trademark(s), if any, upon this webpage is solely to identify Justaus3r goods or services and not for commercial purposes.

  • 1
  • 2
  • 3

Some Checks Have Failed or Are Not Yet Complete

Not All Tests Have Passed


Validation Testing Passed


Verification Testing Passed

Details

Scan Testing Resulted in Flagged:

This package was submitted (and approved) prior to automated virus scanning integration into the package moderation processs.

We recommend clicking the "Details" link to make your own decision on installing this package.

Details
Learn More

Deployment Method: Individual Install, Upgrade, & Uninstall

To install Hash-R, run the following command from the command line or from PowerShell:

>

To upgrade Hash-R, run the following command from the command line or from PowerShell:

>

To uninstall Hash-R, run the following command from the command line or from PowerShell:

>

Deployment Method:

NOTE

This applies to both open source and commercial editions of Chocolatey.

1. Enter Your Internal Repository Url

(this should look similar to https://community.chocolatey.org/api/v2/)


2. Setup Your Environment

1. Ensure you are set for organizational deployment

Please see the organizational deployment guide

2. Get the package into your environment

  • Open Source or Commercial:
    • Proxy Repository - Create a proxy nuget repository on Nexus, Artifactory Pro, or a proxy Chocolatey repository on ProGet. Point your upstream to https://community.chocolatey.org/api/v2/. Packages cache on first access automatically. Make sure your choco clients are using your proxy repository as a source and NOT the default community repository. See source command for more information.
    • You can also just download the package and push it to a repository Download

3. Copy Your Script

choco upgrade hash-r -y --source="'INTERNAL REPO URL'" [other options]

See options you can pass to upgrade.

See best practices for scripting.

Add this to a PowerShell script or use a Batch script with tools and in places where you are calling directly to Chocolatey. If you are integrating, keep in mind enhanced exit codes.

If you do use a PowerShell script, use the following to ensure bad exit codes are shown as failures:


choco upgrade hash-r -y --source="'INTERNAL REPO URL'" 
$exitCode = $LASTEXITCODE

Write-Verbose "Exit code was $exitCode"
$validExitCodes = @(0, 1605, 1614, 1641, 3010)
if ($validExitCodes -contains $exitCode) {
  Exit 0
}

Exit $exitCode

- name: Install hash-r
  win_chocolatey:
    name: hash-r
    version: '1.0'
    source: INTERNAL REPO URL
    state: present

See docs at https://docs.ansible.com/ansible/latest/modules/win_chocolatey_module.html.


chocolatey_package 'hash-r' do
  action    :install
  source   'INTERNAL REPO URL'
  version  '1.0'
end

See docs at https://docs.chef.io/resource_chocolatey_package.html.


cChocoPackageInstaller hash-r
{
    Name     = "hash-r"
    Version  = "1.0"
    Source   = "INTERNAL REPO URL"
}

Requires cChoco DSC Resource. See docs at https://github.com/chocolatey/cChoco.


package { 'hash-r':
  ensure   => '1.0',
  provider => 'chocolatey',
  source   => 'INTERNAL REPO URL',
}

Requires Puppet Chocolatey Provider module. See docs at https://forge.puppet.com/puppetlabs/chocolatey.


4. If applicable - Chocolatey configuration/installation

See infrastructure management matrix for Chocolatey configuration elements and examples.

Package Approved

This package was approved by moderator flcdrg on 08 Mar 2021.

Description

Description:

Hash-R is a simple tool to crack various hashes and has the ability to retrieve SAM(The Security Account Manager (SAM) is a database file in Windows XP, Windows Vista, Windows 7, 8.1 and 10 that stores users' passwords) file from registry.

For more details, visit the GitHub repro.


bin\banner\banner1
 
bin\banner\banner10
 
bin\banner\banner2
 
bin\banner\banner3
 
bin\banner\banner4
 
bin\banner\banner5
 
bin\banner\banner6
 
bin\banner\banner7
 
bin\banner\banner8
 
bin\banner\banner9
 
bin\Exo.exe
md5: B4BB4727F022223F06964D7E698795C8 | sha1: 8C550A0E478EFC141A72B42DEF386F5CF5B88269 | sha256: 9685E49BB4B21B422351D0CCFD292D765FA7174AE2971327DC35E33C1A6E30AA | sha512: A85634F9A8F3AB7319BE9E5EFDB5E8984DC58CFB0C02B9BF164366DA02E7EA0580AD072D943CFF6D10ECF2B4585B004664D31C26E1EE2E68C22F029CE70AEFB2
bin\Hash-R.bat
@echo off 
title Hash-R
color 0b
cd /d "%~dp0"
::you can add more banner's in banner directory then increase the maxvalue accordingly
SET maxvalue=10
SET minvalue=1
SETLOCAL 
SET /A tmpRandom=((%RANDOM%)%%(%maxvalue%))+(%minvalue%)
type "banner\banner%tmpRandom%"
"%~dp0Exo.exe" /M:2:1 /C:0e /T:********************************* && echo.
"%~dp0Exo.exe" /M:2:1 /C:0e /T: Hash cracking tool  && echo.
"%~dp0Exo.exe" /M:2:1 /C:0c /T: Hey! /M:2:1 /C:0e /T: yeah you,am /M:2:1 /C:0c /T: not /M:2:1 /C:0e /T: responsible && echo. 
"%~dp0Exo.exe" /M:2:1 /C:0e /T: for your naughty work. && echo.
"%~dp0Exo.exe" /M:2:1 /C:0e /T:********************************* && echo.
ping localhost -n 2 >nul
setlocal enabledelayedexpansion

:Main
	:: Build the menu one time
	call :Build-Menu "MyMainMenu" MainMenu

:ShowMainMenu	
	echo.
	"%~dp0Exo.exe" /M:2:1 /C:0a /T:- /M:2:1 /C:0b /T:- /M:2:1 /C:0c /T:- /M:2:1 /C:0d /T:- /M:2:1 /C:0e /T:- /M:2:1 /C:0f /T: -
    "%~dp0Exo.exe" /M:2:1 /C:0e /T:CONTROL PANEL
    "%~dp0Exo.exe" /M:2:1 /C:0a /T:- /M:2:1 /C:0b /T:- /M:2:1 /C:0c /T:- /M:2:1 /C:0d /T:- /M:2:1 /C:0e /T:- /M:2:1 /C:0f /T: -
	echo.
    echo.
	call :Display-Menu MainMenu "'------------Choose your option" R1
	
	call %R1%

	goto ShowMainMenu



:: Build the menu
:Build-Menu <1=Menu-Prefix> <2=MenuVar-Out>
	set nmenu=1
	for /F "tokens=1*" %%a in ('findstr /c:":%~1-" /b "%~f0"') do (
		set Menu-%~2-N[!nmenu!]=%%a
		set Menu-%~2-Text[!nmenu!]=%%b

		set /A nmenu+=1
	)

	set /a Menu%~2=%nmenu%-1

	set nmenu=
	
	:: Return the number of menu items built
	exit /b %nmenu%

:: Show a menu
:Display-Menu <1=MenuVar-In> <2=Prompt-Text> <3=Dispatch-Label-Out>
	setlocal
	set choices=
	for /l %%a in (1, 1, !Menu%~1!) do (
		for /f "tokens=2 delims=-" %%b in ("!Menu-%~1-N[%%a]!") do (
			set choice=%%b
			set choices=!choices!!choice!
		)
		echo ^!choice!^) !Menu-%~1-Text[%%a]!
	)
	choice /C:%choices% /M "%~2"
	(
		endlocal
		set %~3=!Menu-%~1-N[%errorlevel%]!
		exit /b 0
	)


:MyMainMenu-A Crack MD2
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Choose a password file 
"%~dp0Exo.exe" /M:2:1 /C:0c /T:(FILENAME SHOULD BE WITHOUT WHITESPACES):
echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:----- && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:     -------- /M:2:1 /C:0e /T:$/M:2:1 /C:0d /T:PATH:
set/p file=
"%~dp0Exo.exe" /M:2:1 /C:0d /T:Do you want to edit target hash file:
set choicee=
set /p choicee=
if not '%choicee%'=='' set choicee=%choicee:~0,1%
if '%choicee%'=='y' goto edit_hashfile_md2
if '%choicee%'=='n' goto crackmd2
if '%choicee%'=='Y' goto edit_hashfile_md2
if '%choicee%'=='N' goto crackmd2
:edit_hashfile_md2
notepad md2\hash.txt
goto crackmd2
:crackmd2
cd md2
call MD2CrackeR.bat %file%
pause
 exit
:MyMainMenu-B Crack MD4
 "%~dp0Exo.exe" /M:2:1 /C:0a /T:Choose a password file 
"%~dp0Exo.exe" /M:2:1 /C:0c /T:(FILENAME SHOULD BE WITHOUT WHITESPACES):
echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:----- && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:     -------- /M:2:1 /C:0e /T:$/M:2:1 /C:0d /T:PATH:
set/p file=
"%~dp0Exo.exe" /M:2:1 /C:0d /T:Do you want to edit targeted hash file:
set choicee=
set /p choicee=
if not '%choicee%'=='' set choicee=%choicee:~0,1%
if '%choicee%'=='y' goto edit_hashfile_md4
if '%choicee%'=='n' goto crackmd4
if '%choicee%'=='Y' goto edit_hashfile_md4
if '%choicee%'=='N' goto crackmd4
:edit_hashfile_md4
notepad md4\hash.txt
goto crackmd4
:crackmd4
cd md4
call MD4CrackeR.bat %file%
pause
 exit
:MyMainMenu-C Crack MD5
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Choose a password file 
"%~dp0Exo.exe" /M:2:1 /C:0c /T:(FILENAME SHOULD BE WITHOUT WHITESPACES):
echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:----- && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:     -------- /M:2:1 /C:0e /T:$/M:2:1 /C:0d /T:PATH:
set/p file=
"%~dp0Exo.exe" /M:2:1 /C:0d /T:Do you want to edit targeted hash file:
set choicee=
set /p choicee=
if not '%choicee%'=='' set choicee=%choicee:~0,1%
if '%choicee%'=='y' goto edit_hashfile_md5
if '%choicee%'=='n' goto crackmd5
if '%choicee%'=='Y' goto edit_hashfile_md5
if '%choicee%'=='N' goto crackmd5
:edit_hashfile_md5
notepad md5\hash.txt
goto crackmd5
:crackmd5
cd md5
call MD5CrackeR.bat %file%
pause
 exit
:MyMainMenu-D Crack NTLM
 "%~dp0Exo.exe" /M:2:1 /C:0a /T:Choose a password file 
"%~dp0Exo.exe" /M:2:1 /C:0c /T:(FILENAME SHOULD BE WITHOUT WHITESPACES):
echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:----- && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:     -------- /M:2:1 /C:0e /T:$/M:2:1 /C:0d /T:PATH:
set/p file=
"%~dp0Exo.exe" /M:2:1 /C:0d /T:Do you want to edit targeted hash file:
set choicee=
set /p choicee=
if not '%choicee%'=='' set choicee=%choicee:~0,1%
if '%choicee%'=='y' goto edit_hashfile_ntlm
if '%choicee%'=='n' goto crackntlm
if '%choicee%'=='Y' goto edit_hashfile_ntlm
if '%choicee%'=='N' goto crackntlm
:edit_hashfile_ntlm
notepad ntlm\ntlm.txt
goto crackntlm
:crackntlm
cd ntlm
call NTLMCrackeR.bat %file%
pause
 exit
:MyMainMenu-E Crack SHA1
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Choose a password file 
"%~dp0Exo.exe" /M:2:1 /C:0c /T:(FILENAME SHOULD BE WITHOUT WHITESPACES):
echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:----- && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:     -------- /M:2:1 /C:0e /T:$/M:2:1 /C:0d /T:PATH:
set/p file=
"%~dp0Exo.exe" /M:2:1 /C:0d /T:Do you want to edit targeted hash file:
set choicee=
set /p choicee=
if not '%choicee%'=='' set choicee=%choicee:~0,1%
if '%choicee%'=='y' goto edit_hashfile_sha1
if '%choicee%'=='n' goto cracksha1
if '%choicee%'=='Y' goto edit_hashfile_sha1
if '%choicee%'=='N' goto cracksha1
:edit_hashfile_sha1
notepad sha1\hash.txt
goto cracksha1
:cracksha1
cd sha1
call SHA1CrackeR.bat %file%
pause
 exit
:MyMainMenu-F Crack SHA256
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Choose a password file 
"%~dp0Exo.exe" /M:2:1 /C:0c /T:(FILENAME SHOULD BE WITHOUT WHITESPACES):
echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:----- && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:     -------- /M:2:1 /C:0e /T:$/M:2:1 /C:0d /T:PATH:
set/p file=
"%~dp0Exo.exe" /M:2:1 /C:0d /T:Do you want to edit targeted hash file:
set choicee=
set /p choicee=
if not '%choicee%'=='' set choicee=%choicee:~0,1%
if '%choicee%'=='y' goto edit_hashfile_sha256
if '%choicee%'=='n' goto cracksha256
if '%choicee%'=='Y' goto edit_hashfile_sha256
if '%choicee%'=='N' goto cracksha256
:edit_hashfile_sha256
notepad sha256\hash.txt
goto cracksha256
:cracksha256
cd sha256
call SHA256CrackeR.bat %file%
pause
 exit
:MyMainMenu-G Crack SHA384
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Choose a password file 
"%~dp0Exo.exe" /M:2:1 /C:0c /T:(FILENAME SHOULD BE WITHOUT WHITESPACES):
echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:----- && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:     -------- /M:2:1 /C:0e /T:$/M:2:1 /C:0d /T:PATH:
set/p file=
"%~dp0Exo.exe" /M:2:1 /C:0d /T:Do you want to edit targeted hash file:
set choicee=
set /p choicee=
if not '%choicee%'=='' set choicee=%choicee:~0,1%
if '%choicee%'=='y' goto edit_hashfile_sha384
if '%choicee%'=='n' goto cracksha384
if '%choicee%'=='Y' goto edit_hashfile_sha384
if '%choicee%'=='N' goto cracksha384
:edit_hashfile_sha384
notepad sha384\hash.txt
goto cracksha384
:cracksha384
cd sha384
call SHA384CrackeR.bat %file%
pause
 exit
:MyMainMenu-H Crack SHA512
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Choose a password file 
"%~dp0Exo.exe" /M:2:1 /C:0c /T:(FILENAME SHOULD BE WITHOUT WHITESPACES):
echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:----- && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:    ^| && echo.
"%~dp0Exo.exe" /M:2:1 /C:0d /T:     -------- /M:2:1 /C:0e /T:$/M:2:1 /C:0d /T:PATH:
set/p file=
"%~dp0Exo.exe" /M:2:1 /C:0d /T:Do you want to edit targeted hash file:
set choicee=
set /p choicee=
if not '%choicee%'=='' set choicee=%choicee:~0,1%
if '%choicee%'=='y' goto edit_hashfile_sha512
if '%choicee%'=='n' goto cracksha512
if '%choicee%'=='Y' goto edit_hashfile_sha512
if '%choicee%'=='N' goto cracksha512
:edit_hashfile_sha512
notepad sha512\hash.txt
goto cracksha512
:cracksha512
cd sha512
call SHA512CrackeR.bat %file%
pause
 exit
:MyMainMenu-I Retrieve Sam file(requires sudo privileges)
mkdir "%windir%\AdminCheck" 2>nul
if '%errorlevel%' == '0' rmdir "%windir%\AdminCheck" & call :gotPrivileges else call :getPrivileges
:getPrivileges
echo Invoking Uac for Privilege Escalation..
call "%~dp0runadmin.vbs" "%~dp0retsam.bat" 
exit
:gotPrivileges
call "%~dp0retsam.bat" 
exit
:MyMainMenu-J Help
cls
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Help: && echo. && echo.
"%~dp0Exo.exe" /M:2:1 /C:0a /T:First choose the hash you want to crack. && echo.
"%~dp0Exo.exe" /M:2:1 /C:0a /T:then give the path for password file. && echo.
"%~dp0Exo.exe" /M:2:1 /C:0a /T:then edit the target hash file in which target hash will be stored && echo.
"%~dp0Exo.exe" /M:2:1 /C:0a /T:tool will start a bruteforce attack to crack the hash. && echo.
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Please note that it depends on your luck, password file and time to crack the hash.  && echo.
pause
exit
:MyMainMenu-Q Quit
 exit
bin\LICENSE
 
bin\md2\Exo.exe
md5: B4BB4727F022223F06964D7E698795C8 | sha1: 8C550A0E478EFC141A72B42DEF386F5CF5B88269 | sha256: 9685E49BB4B21B422351D0CCFD292D765FA7174AE2971327DC35E33C1A6E30AA | sha512: A85634F9A8F3AB7319BE9E5EFDB5E8984DC58CFB0C02B9BF164366DA02E7EA0580AD072D943CFF6D10ECF2B4585B004664D31C26E1EE2E68C22F029CE70AEFB2
bin\md2\hash.txt
updateme
bin\md2\MD2CrackeR.bat
@echo off
CD /D "%~dp0"
set /p psh=<hash.txt
for /f %%a in (%1) do (
   call :funch %%a  
)
:funch
set userinput=%1
set "plaintext=%userinput%"
set "file=%temp%\%~n0.tmp"
set md2=

if not defined plaintext set /P "plaintext="

if exist "%plaintext%" (
    set "file=%plaintext%"
) else for %%I in ("%file%") do if %%~zI equ 0 (
    <NUL >"%file%" set /P "=%plaintext%"
)

for /f "skip=1 delims=" %%I in ('certutil -hashfile "%file%" MD2') do (
    if not defined md2 set "md2=%%I"
)

2>NUL del "%temp%\%~n0.tmp"

if  "%md2: =%" equ "%psh%" ( goto cracked) else ( goto notcracked)

:cracked
cls
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0a /T: Success && echo.
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Congratulation.Password has been cracked.it was /M:2:1 /C:0e /T: "%userinput%" && echo.
echo %userinput% >>C:\Users\%username%\Desktop\Cracked.txt
"%~dp0Exo.exe" /M:2:1 /C:0a /T: Saved the password in C:\Users\%username%\Desktop\Cracked.txt && echo.
pause
exit
:notcracked
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0c /T: Failed && echo.

bin\md4\Exo.exe
md5: B4BB4727F022223F06964D7E698795C8 | sha1: 8C550A0E478EFC141A72B42DEF386F5CF5B88269 | sha256: 9685E49BB4B21B422351D0CCFD292D765FA7174AE2971327DC35E33C1A6E30AA | sha512: A85634F9A8F3AB7319BE9E5EFDB5E8984DC58CFB0C02B9BF164366DA02E7EA0580AD072D943CFF6D10ECF2B4585B004664D31C26E1EE2E68C22F029CE70AEFB2
bin\md4\hash.txt
updateme
bin\md4\MD4CrackeR.bat
@echo off
set /p psh=<hash.txt
for /f %%a in (%1) do (
   call :funch %%a  
)
:funch
set userinput=%1
set "plaintext=%userinput%"
set "file=%temp%\%~n0.tmp"
set md4=

if not defined plaintext set /P "plaintext="

if exist "%plaintext%" (
    set "file=%plaintext%"
) else for %%I in ("%file%") do if %%~zI equ 0 (
    <NUL >"%file%" set /P "=%plaintext%"
)

for /f "skip=1 delims=" %%I in ('certutil -hashfile "%file%" MD4') do (
    if not defined md4 set "md4=%%I"
)

2>NUL del "%temp%\%~n0.tmp"

if  "%md4: =%" equ "%psh%" ( goto cracked) else ( goto notcracked)

:cracked
cls
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0a /T: Success && echo.
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Congratulation.Password has been cracked.it was /M:2:1 /C:0e /T: "%userinput%" && echo.
echo %userinput% >>C:\Users\%username%\Desktop\Cracked.txt
"%~dp0Exo.exe" /M:2:1 /C:0a /T: Saved the password in C:\Users\%username%\Desktop\Cracked.txt && echo.
pause
exit
:notcracked
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0c /T: Failed && echo.
bin\md5\Exo.exe
md5: B4BB4727F022223F06964D7E698795C8 | sha1: 8C550A0E478EFC141A72B42DEF386F5CF5B88269 | sha256: 9685E49BB4B21B422351D0CCFD292D765FA7174AE2971327DC35E33C1A6E30AA | sha512: A85634F9A8F3AB7319BE9E5EFDB5E8984DC58CFB0C02B9BF164366DA02E7EA0580AD072D943CFF6D10ECF2B4585B004664D31C26E1EE2E68C22F029CE70AEFB2
bin\md5\hash.txt
updateme
bin\md5\MD5CrackeR.bat
@echo off
set /p psh=<hash.txt
for /f %%a in (%1) do (
   call :funch %%a  
)
:funch
set userinput=%1
set "plaintext=%userinput%"
set "file=%temp%\%~n0.tmp"
set md5=

if not defined plaintext set /P "plaintext="

if exist "%plaintext%" (
    set "file=%plaintext%"
) else for %%I in ("%file%") do if %%~zI equ 0 (
    <NUL >"%file%" set /P "=%plaintext%"
)

for /f "skip=1 delims=" %%I in ('certutil -hashfile "%file%" MD5') do (
    if not defined md5 set "md5=%%I"
)

2>NUL del "%temp%\%~n0.tmp"

if  "%md5: =%" equ "%psh%" ( goto cracked) else ( goto notcracked)

:cracked
cls
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0a /T: Success && echo.
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Congratulation.Password has been cracked.it was /M:2:1 /C:0e /T: "%userinput%" && echo.
echo %userinput% >>C:\Users\%username%\Desktop\Cracked.txt
"%~dp0Exo.exe" /M:2:1 /C:0a /T: Saved the password in C:\Users\%username%\Desktop\Cracked.txt && echo.
pause
exit
:notcracked
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0c /T: Failed && echo.

bin\ntlm\Exo.exe
md5: B4BB4727F022223F06964D7E698795C8 | sha1: 8C550A0E478EFC141A72B42DEF386F5CF5B88269 | sha256: 9685E49BB4B21B422351D0CCFD292D765FA7174AE2971327DC35E33C1A6E30AA | sha512: A85634F9A8F3AB7319BE9E5EFDB5E8984DC58CFB0C02B9BF164366DA02E7EA0580AD072D943CFF6D10ECF2B4585B004664D31C26E1EE2E68C22F029CE70AEFB2
bin\ntlm\HashConsole.exe
md5: D7C646A6DF655FE1E77EC35EC95D1539 | sha1: E741A3FE2E457641BAC6AF88A4E700DC715C86BA | sha256: A0B75B5AAE14ADA1F9CC2853DA31C046FB3F55B1D23F288819149795E1FCDCE6 | sha512: AD42259F9E5C3B83DB5B6AB2C94C4C759F47E17DCCD70E9F148A0E9C9C884B18CB690C20482173A12ABC9FD0B3E7899A707FEE9FE9E6A23716805FAD67310F51
bin\ntlm\ntlm.txt
updateme
bin\ntlm\NTLMCrackeR.bat
@echo off
setlocal enableextensions enabledelayedexpansion
set /p passhash=<ntlm.txt
::looping passwords to try everytime
for /f %%a in (%1) do (
   call :funch %%a  
)
::using hashconsole to extract and filter ntlm hash of our passwords and storing them in variable
:funch
set userinput=%1
set "plaintext=%userinput%"
for /f "tokens=1-2 delims=NTLM" %%a in ('HashConsole.exe -t %plaintext%^|find "NTLM"') do set ntlmh=%%b
echo %ntlmh% >>nth.txt
set "num=32"
set /a num=%num%+1

for /f "delims=" %%f in (nth.txt) do (
set a=%%f
echo !a:~31,%num%! >>ntlh.txt
set /p ntlmhash=<ntlh.txt
del ntlh.txt
del nth.txt
)
::Validating hashes,if a hash is matched then the password against it is thrown as the cracked password.
if %passhash% equ %ntlmhash% ( goto cracked) else ( goto  error)
:error
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0c /T: Failed && echo.
goto :EOF
:cracked
cls
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0a /T: Success && echo.
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Congratulation.Password has been cracked.it was /M:2:1 /C:0e /T: "%userinput%" && echo.
echo %userinput% >>C:\Users\%username%\Desktop\Cracked.txt
"%~dp0Exo.exe" /M:2:1 /C:0a /T: Saved the password in C:\Users\%username%\Desktop\Cracked.txt && echo.
pause
exit


bin\Plz Disable antivirus.txt
Please disable Antivirus software as it may detect some of its file's as malware(false positive).there is
no harm in this tool if you don't believe then you are welcomed not to use this tool :).
bin\README.md
### Readme.md 👋
## Hash-R
![License](https://img.shields.io/badge/License-GPL3.0-<brightgreen>)
![Contribution](https://img.shields.io/badge/Contributions-Welcome-<brightgreen>)
![Status](https://img.shields.io/badge/Status-Alive-<brightgreen>)

Hash-R is a command line tool that can be used to crack various hashes such as md2,md4,sha1 and much more.
it can also retrieve sam file.there  is a version of mimikatz to dump hashes from SAM file.
#### Hashes supported/features:
- MD2
- MD4
- MD5
- SHA1
- SHA256
- SHA384
- SHA512
- NTLM
- Retrieve sam file from registry.
- Cool random banner's
#### Screenshot:
![screenshot](https://drive.google.com/uc?export=download&id=1Nazpx6g5g50CW8O-ZhuR0PUyLTrEehif)
### Note:
Please disable your anti-virus software before using this tool becuase it might delete some file's and the tool won't work properly.there is no harm in this tool but if you don't believe me then you are welcomed not to use this tool.
### limitations/known issues:
- Issues with some special character's in a file.
- Can crack only 1 hash at a time(to crack multiple hashes you would need to start another session)/no Multithreading.
### Changelog:

| Date:         | Comment:         | 
| ------------- |:-------------:   | 
| 22-jan-2021   | Initial Release  | 
| 5-feb-2021    | Some small fixes | 

 
### Disclaimer:
i am not responsible for your naughty work!
### Bug Report:
Report a issue at https://github.com/Justaus3r/Hash-R/issues
### Contributions:
All contributions are welcomed.if you have an suggestion for improvement you can mail me at [email protected]. you can fork this repo and pull request's for improvement.
### License:
Distributed under GPL3.0.
bin\retsam.bat
@echo off
reg save hklm\sam "%~dp0SAM"
reg save hklm\system "%~dp0SYSTEM"
bin\runadmin.vbs
Set UAC = CreateObject("Shell.Application")
Set args = WScript.Arguments
UAC.ShellExecute args.Item(0), "", "", "runas", 1
bin\sha1\Exo.exe
md5: B4BB4727F022223F06964D7E698795C8 | sha1: 8C550A0E478EFC141A72B42DEF386F5CF5B88269 | sha256: 9685E49BB4B21B422351D0CCFD292D765FA7174AE2971327DC35E33C1A6E30AA | sha512: A85634F9A8F3AB7319BE9E5EFDB5E8984DC58CFB0C02B9BF164366DA02E7EA0580AD072D943CFF6D10ECF2B4585B004664D31C26E1EE2E68C22F029CE70AEFB2
bin\sha1\hash.txt
updateme
bin\sha1\SHA1CrackeR.bat
@echo off
set /p psh=<hash.txt
for /f %%a in (%1) do (
   call :funch %%a  
)
:funch
set userinput=%1
set "plaintext=%userinput%"
set "file=%temp%\%~n0.tmp"
set sha1=

if not defined plaintext set /P "plaintext="

if exist "%plaintext%" (
    set "file=%plaintext%"
) else for %%I in ("%file%") do if %%~zI equ 0 (
    <NUL >"%file%" set /P "=%plaintext%"
)

for /f "skip=1 delims=" %%I in ('certutil -hashfile "%file%" SHA1') do (
    if not defined sha1 set "sha1=%%I"
)

2>NUL del "%temp%\%~n0.tmp"

if  "%sha1: =%" equ "%psh%" ( goto cracked) else ( goto notcracked)

:cracked
cls
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0a /T: Success && echo.
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Congratulation.Password has been cracked.it was /M:2:1 /C:0e /T: "%userinput%" && echo.
echo %userinput% >>C:\Users\%username%\Desktop\Cracked.txt
"%~dp0Exo.exe" /M:2:1 /C:0a /T: Saved the password in C:\Users\%username%\Desktop\Cracked.txt && echo.
pause
exit
:notcracked
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0c /T: Failed && echo.


bin\sha256\Exo.exe
md5: B4BB4727F022223F06964D7E698795C8 | sha1: 8C550A0E478EFC141A72B42DEF386F5CF5B88269 | sha256: 9685E49BB4B21B422351D0CCFD292D765FA7174AE2971327DC35E33C1A6E30AA | sha512: A85634F9A8F3AB7319BE9E5EFDB5E8984DC58CFB0C02B9BF164366DA02E7EA0580AD072D943CFF6D10ECF2B4585B004664D31C26E1EE2E68C22F029CE70AEFB2
bin\sha256\hash.txt
updateme
bin\sha256\SHA256CrackeR.bat
@echo off
set /p psh=<hash.txt
for /f %%a in (%1) do (
   call :funch %%a  
)
:funch
set userinput=%1
set "plaintext=%userinput%"
set "file=%temp%\%~n0.tmp"
set sha256=

if not defined plaintext set /P "plaintext="

if exist "%plaintext%" (
    set "file=%plaintext%"
) else for %%I in ("%file%") do if %%~zI equ 0 (
    <NUL >"%file%" set /P "=%plaintext%"
)

for /f "skip=1 delims=" %%I in ('certutil -hashfile "%file%" SHA256') do (
    if not defined sha256 set "sha256=%%I"
)

2>NUL del "%temp%\%~n0.tmp"

if  "%sha256: =%" equ "%psh%" ( goto cracked) else ( goto notcracked)

:cracked
cls
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0a /T: Success && echo.
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Congratulation.Password has been cracked.it was /M:2:1 /C:0e /T: "%userinput%" && echo.
echo %userinput% >>C:\Users\%username%\Desktop\Cracked.txt
"%~dp0Exo.exe" /M:2:1 /C:0a /T: Saved the password in C:\Users\%username%\Desktop\Cracked.txt && echo.
pause
exit
:notcracked
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0c /T: Failed && echo.
bin\sha384\Exo.exe
md5: B4BB4727F022223F06964D7E698795C8 | sha1: 8C550A0E478EFC141A72B42DEF386F5CF5B88269 | sha256: 9685E49BB4B21B422351D0CCFD292D765FA7174AE2971327DC35E33C1A6E30AA | sha512: A85634F9A8F3AB7319BE9E5EFDB5E8984DC58CFB0C02B9BF164366DA02E7EA0580AD072D943CFF6D10ECF2B4585B004664D31C26E1EE2E68C22F029CE70AEFB2
bin\sha384\hash.txt
updateme
bin\sha384\SHA384CrackeR.bat
@echo off
set /p psh=<hash.txt
for /f %%a in (%1) do (
   call :funch %%a  
)
:funch
set userinput=%1
set "plaintext=%userinput%"
set "file=%temp%\%~n0.tmp"
set sha384=

if not defined plaintext set /P "plaintext="

if exist "%plaintext%" (
    set "file=%plaintext%"
) else for %%I in ("%file%") do if %%~zI equ 0 (
    <NUL >"%file%" set /P "=%plaintext%"
)

for /f "skip=1 delims=" %%I in ('certutil -hashfile "%file%" SHA384') do (
    if not defined sha384 set "sha384=%%I"
)

2>NUL del "%temp%\%~n0.tmp"

if  "%sha384: =%" equ "%psh%" ( goto cracked) else ( goto notcracked)

:cracked
cls
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0a /T: Success && echo.
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Congratulation.Password has been cracked.it was /M:2:1 /C:0e /T: "%userinput%" && echo.
echo %userinput% >>C:\Users\%username%\Desktop\Cracked.txt
"%~dp0Exo.exe" /M:2:1 /C:0a /T: Saved the password in C:\Users\%username%\Desktop\Cracked.txt && echo.
pause
exit
:notcracked
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0c /T: Failed && echo.
bin\sha512\Exo.exe
md5: B4BB4727F022223F06964D7E698795C8 | sha1: 8C550A0E478EFC141A72B42DEF386F5CF5B88269 | sha256: 9685E49BB4B21B422351D0CCFD292D765FA7174AE2971327DC35E33C1A6E30AA | sha512: A85634F9A8F3AB7319BE9E5EFDB5E8984DC58CFB0C02B9BF164366DA02E7EA0580AD072D943CFF6D10ECF2B4585B004664D31C26E1EE2E68C22F029CE70AEFB2
bin\sha512\hash.txt
updateme
bin\sha512\SHA512CrackeR.bat
@echo off
set /p psh=<hash.txt
for /f %%a in (%1) do (
   call :funch %%a  
)
:funch
set userinput=%1
set "plaintext=%userinput%"
set "file=%temp%\%~n0.tmp"
set sha512=

if not defined plaintext set /P "plaintext="

if exist "%plaintext%" (
    set "file=%plaintext%"
) else for %%I in ("%file%") do if %%~zI equ 0 (
    <NUL >"%file%" set /P "=%plaintext%"
)

for /f "skip=1 delims=" %%I in ('certutil -hashfile "%file%" SHA512') do (
    if not defined sha512 set "sha512=%%I"
)

2>NUL del "%temp%\%~n0.tmp"

if  "%sha512: =%" equ "%psh%" ( goto cracked) else ( goto notcracked)

:cracked
cls
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0a /T: Success && echo.
"%~dp0Exo.exe" /M:2:1 /C:0a /T:Congratulation.Password has been cracked.it was /M:2:1 /C:0e /T: "%userinput%" && echo.
echo %userinput% >>C:\Users\%username%\Desktop\Cracked.txt
"%~dp0Exo.exe" /M:2:1 /C:0a /T: Saved the password in C:\Users\%username%\Desktop\Cracked.txt && echo.
pause
exit
:notcracked
"%~dp0Exo.exe" /M:2:1 /C:0b /T:Current Try:: /M:2:1 /C:0d /T: %userinput% /M:2:1 /C:0e /T:: /M:2:1 /C:0c /T: Failed && echo.
tools\chocolateyInstall.ps1
Install-BinFile -Name 'Hash-R' -Path '..\bin\Hash-R.bat'

tools\chocolateyUninstall.ps1
Uninstall-BinFile 'Hash-R' '..\bin\Hash-R.bat'


tools\LICENSE.txt

LICENSE(HashConsole)
SecurityXploded Software License Terms
These license terms apply to anyone downloading, installing or using the softwares from SecurityXploded.com.  
Please read carefully the terms mentioned below and you must AGREE to these terms before proceeding with the installation or using any software from SecurityXploded.com
1.	INSTALLATION AND USE RIGHTS.  You may install and use any number of copies of the software on your devices.
2.	SCOPE OF LICENSE.  The software is licensed, not sold. This agreement only gives you some rights to use the software.  SecurityXploded reserves all other rights.  Unless applicable law gives you more rights despite this limitation, you may use the software only as expressly permitted in this agreement.  In doing so, you must comply with any technical limitations in the software that only allow you to use it in certain ways.   
	You may not
•	work around any technical limitations in the binary versions of the software;
•	reverse engineer, decompile or disassemble the binary versions of the software, except and only to the extent that applicable law expressly permits, despite this limitation;
•	make more copies of the software than specified in this agreement or allowed by applicable law, despite this limitation;
•	rent, lease or lend the software;
•	transfer the software or this agreement to any third party; or
•	use the software for commercial software hosting services.
3	INTELLECTUAL PROPERTY.   You acknowledge that SecurityXploded is the proprietor of all industrial, free and intellectual property rights including the copyright in the software and the related items and including all versions or adaptations of the software and the related items. SecurityXploded expressly reserves all such rights in accordance with international copyright law except those expressly granted to you in this license.
4.	DOCUMENTATION.  Any person that has valid access to your computer or internal network may copy and use the documentation for your internal, reference purposes.
5.	EXPORT RESTRICTIONS.  You must comply with all domestic and international export laws and regulations that apply to the software.  These laws include restrictions on destinations, end users and end use as per the laws in your respective country.
6.	SUPPORT SERVICES. Because this software is "as is," we may not provide support services for it.
7.  REPUBLISHING OF SOFTWARE ON INTERNET & PRINT MEDIA.  Download sites on the internet and print media are allowed to publish any FREE software from SecurityXploded.com as long as the original content, website information, copyright and author information is preserved and duly mentioned in the published site or print media. You should not customize or integrate or re-bundle this software in any way that affects the integrity of the originally distributed software or any of these license terms. 
8.	LEGAL EFFECT.  This agreement describes certain legal rights.  You may have other rights under the laws of your country.  You may also have rights with respect to the party from whom you acquired the software.  This agreement does not change your rights under the laws of your country if the laws of your country do not permit it to do so.
9.	DISCLAIMER OF WARRANTY.   THE SOFTWARE IS LICENSED "AS-IS."  YOU BEAR THE RISK OF USING IT.  SECURITYXPLODED GIVES NO EXPRESS WARRANTIES, GUARANTEES OR CONDITIONS.  YOU MAY HAVE ADDITIONAL CONSUMER RIGHTS UNDER YOUR LOCAL LAWS WHICH THIS AGREEMENT CANNOT CHANGE.  TO THE EXTENT PERMITTED UNDER YOUR LOCAL LAWS, SECURITYXPLODED EXCLUDES THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.
10.	LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES.  SECURITYXPLODED IS NOT DIRECTLY OR INDIRECTLY RESPONSIBLE FOR ANY DAMAGES OR LIABILITIES. YOU CANNOT RECOVER ANY DAMAGES, INCLUDING CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT OR INCIDENTAL DAMAGES.



<Insert License Here>
tools\VERIFICATION.txt


VERIFICATION
Verification is intended to assist the Chocolatey moderators and community
in verifying that this package's contents are trustworthy.
 
<Include details of how to verify checksum contents>
SHA1 checksum of hashconsole:e741a3fe2e457641bac6af88a4e700dc715c86ba
SHA1 checksum of hashconsole:8c550a0e478efc141a72b42def386f5cf5b88269
SHA1 checksum of Hash-R.bat:0c8dfd246d7cabca90f9cdac430cc52cf94b13b0
ShA1 checksum of retsam.bat:6083b7eed84640b1b0ec2baa1f73281970fa9aa9
<If software vendor, explain that here - checksum verification instructions are optional>
Due to architecture of software,some antivirus detect it as a hafmful object(False positive) but i assure you that the package is totally safe,showin in github.com/justaus3r/Hash-R in screenshot that i am also using it.

Log in or click on link to see number of positives.

In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).

Chocolatey Pro provides runtime protection from possible malware.

Add to Builder Version Downloads Last Updated Status

1.0alpha (Jan 21, 2021) - Initial release


This package has no dependencies.

Discussion for the Hash-R Package

Ground Rules:

  • This discussion is only about Hash-R and the Hash-R package. If you have feedback for Chocolatey, please contact the Google Group.
  • This discussion will carry over multiple versions. If you have a comment about a particular version, please note that in your comments.
  • The maintainers of this Chocolatey Package will be notified about new comments that are posted to this Disqus thread, however, it is NOT a guarantee that you will get a response. If you do not hear back from the maintainers after posting a message below, please follow up by using the link on the left side of this page or follow this link to contact maintainers. If you still hear nothing back, please follow the package triage process.
  • Tell us what you love about the package or Hash-R, or tell us what needs improvement.
  • Share your experiences with the package, or extra configuration or gotchas that you've found.
  • If you use a url, the comment will be flagged for moderation until you've been whitelisted. Disqus moderated comments are approved on a weekly schedule if not sooner. It could take between 1-5 days for your comment to show up.
comments powered by Disqus