Recover passwords from VeraCrypt, BitLocker, LUKS, FileVault volumes and KeePass databases. GPU-powered attacks on encrypted disk containers.
Submit Hash →VeraCrypt supports multiple hash algorithms (SHA-256, SHA-512, Whirlpool, RIPEMD-160, Streebog) with high PBKDF2 iteration counts (up to 500,000+). This makes it one of the slowest hash types to crack. Each combination has its own hashcat mode.
We need the first 512 bytes of the VeraCrypt volume (the header) for cracking.
BitLocker uses AES-CCM or AES-XTS with a key derived from the user password via PBKDF2-SHA256. Hashcat mode 22100. Moderately slow — feasible for passwords up to moderate complexity.
Linux Unified Key Setup. Uses PBKDF2 with configurable hash and very high iteration counts. One of the most computationally expensive targets. LUKS2 with Argon2 is even harder.
macOS FileVault 2 uses AES-XTS with a PBKDF2-derived key. Moderately slow, similar in difficulty to BitLocker.
KeePass password manager databases (.kdbx) use AES-KDF or Argon2 for key derivation. Configurable rounds make it computationally expensive but crackable with weak passwords.
Disk encryption hashes are among the slowest to crack. Success depends heavily on password complexity. With partial password knowledge, feasibility increases significantly. Truly random passwords of 12+ characters are generally not feasible.
Disk encryption / KeePass: $200+ per hash. Price depends on algorithm and expected GPU time. Free feasibility assessment. No result = no charge.
Send your hash. Free feasibility assessment.