Legacy Hashing, No Hashing

About Us

We are revolutionizing cybersecurity by leveraging blockchain technology to enhance the transparency, security, and rewards of hash cracking tasks. Unlike unreliable platforms, our system guarantees secure processes and equitable rewards through the use of smart contracts. Experts can confidently test hash strength, free from intermediaries, with a focus on innovation and transparency. Have fun cracking passwords and earn money!

    

The entire project is on the solana devnet. There is no official token created yet.

Unlockhash Token Utility

Unlockhash is a Solana-based token with a unique utility: it allows users to set up rewards for others to help crack hashes.

How It Works

The process is divided into two stages:

Stage 1: Submit Hash and Reward

The user who wants to crack a hash submits the hash (e.g., MD5) and specifies a reward in Solana (SOL).
  • If the hash has already been cracked by another user, the result will appear in the "Cracked Hashes" list, allowing the user to access the solution without paying.
  • If there is an active search for the same hash, the rewards will accumulate and be shared among the participants attempting to crack it.

Stage 2: Claim Attempt

Once the user successfully cracks the hash and uploads the result, the system will automatically verify its correctness and release the reward to the person who cracked it.

Transparency

All cracked hashes will be publicly listed in the "Claimed Hashes" section.
Note: MD5 is just an example. Future integrations will include other hash algorithms like SHA3 and more.

Solana Reward Distribution

  • 70% of the reward goes to the user who cracked the hash.
  • 20% of the reward for cracking the hash is used to purchase and burn Unlockhash tokens.
  • 10% of the reward paid for cracking the hash is reserved for the team.

Fully Decentralized

The application operates 100% under a DeFi (decentralized finance model) and we strongly believe in and allow auditing through released source code.

Burned tokens

$ULH

Crack Hashes

Select the algorithm you want to work with

Processing ...

Cracking the Code: Hash Algorithms & Rewards

#AlgorithmHashRewardClaimed

Buy Token $ULH

To buy the token you have this options:
- Pink Sale (comming soon)
- DEX (comming soon)
- CEX (comming soon)

Roadmap

Q1 - 2025

  • Launch website
  • Launch socials (Twitter/Telegram)
  • Deploy NTLM Smart Contract
  • Deploy MySQL Smart Contract
  • Deploy MD5 Smart Contract
  • Deploy SHA-1 Smart Contract
  • Deploy SHA-256 Smart Contract
  • Deploy SHA-512 Smart Contract
  • Release Open Source code for allow auditing

Q2 - 2025

  • Empower community
  • Marketing
  • Pre Sale
  • Launch Token
  • Pay DEX Boost
  • Bounce to DEX
  • Pay DEX Ads

Q3 - 2025

  • CEX Listing
  • Release usable code for miners and AI
  • Add More Algorithms

Faq

There are many tools. We recommend hashcat. It has many modes of use, such as dictionary attacks or mask attacks. In this example we will show the use of mask attacks.
 
Prerequisites
1 - Installing Hashcat
    Download and install Hashcat from its official site: https://hashcat.net/hashcat/
2 - Test hashcat working
    Linux: ./hashcat.bin --version
        v6.2.6
    Windows: hashcat.exe --version
        v6.2.6
3 - An MD5 hash to crack
    For example: 5d41402abc4b2a76b9719d911017c592 (hash of "hello").
4 - Run hashcat, which will try to match 5 letters between "a" and "z"
    Linux: ./hashcat.bin -a 3 -m 0 "5d41402abc4b2a76b9719d911017c592" ?l?l?l?l?l
    Windows: hashcat.exe -a 3 -m 0 "5d41402abc4b2a76b9719d911017c592" ?l?l?l?l?l