Recover passwords from MySQL, PostgreSQL, MSSQL, and Oracle database hashes. Fast GPU-powered attacks on all major DBMS hash formats.
Submit Database Hash →MySQL 3.x/4.x (mode 200) uses a very weak proprietary hash — cracked almost instantly. MySQL 5.x+ (mode 300) uses SHA-1 without salt — still ultra-fast on GPUs. These are among the easiest hashes to crack.
*6C8989366EAF6CBBDE1A40C80468D8D67A821ABA # MySQL 5.x SHA-1
PostgreSQL stores passwords as MD5 hashes salted with the username: md5(password + username). Extracted from pg_shadow or pg_authid. Fast to crack despite the salt.
md5e19ccf75ee54e06b06a5907af13cef42 # PostgreSQL MD5
SQL Server 2000 (mode 131) uses SHA-1 with salt. SQL Server 2012+ (mode 1731) uses SHA-512 with salt. Both are relatively fast to crack on GPUs.
Oracle 11g (mode 112) uses SHA-1 with salt — fast. Oracle 12c+ (mode 12300) uses PBKDF2-SHA512 with iterations — significantly slower but still feasible for weak passwords.
All database hashes: $100 per hash (same as NTLM/MD5 — fast hashes). Bulk pricing for large user tables. No result = no charge.
Send your hashes. Free assessment, fast results.