Recover Active Directory passwords from NTLM hashes with 99%+ success rate. GPU-accelerated attacks deliver results in minutes, not days.
Submit NTLM Hash →NTLM (NT LAN Manager) is the password hashing algorithm used by Microsoft Windows and Active Directory. Every Windows domain stores user passwords as NTLM hashes in the SAM database or the NTDS.dit file on domain controllers. When you extract credentials using tools like secretsdump.py, mimikatz, or hashdump, the output is typically in NTLM format.
An NTLM hash looks like this:
Administrator:500:aad3b435b51404eeaad3b435b51404ee:e19ccf75ee54e06b06a5907af13cef42:::
The relevant part for cracking is the NT hash: e19ccf75ee54e06b06a5907af13cef42. This is a straightforward MD4 hash of the Unicode password — no salt, no iterations, making NTLM one of the fastest hash types to crack.
NTLM is an unsalted, single-iteration hash. On modern GPU hardware, we test hundreds of billions of candidates per second:
Speed.#*.........: 5,297.0 GH/s (Optimized Kernel, -O)
5.3 trillion candidates/sec. Every possible 8-character password (all printable ASCII) tested in under 3 hours.
At these speeds, most real-world passwords (dictionary words, common patterns, keyboard walks, date-based passwords) fall within minutes. Passwords up to 8 characters can be fully brute-forced.
?u?l?l?l?l?l?d?d.Summer2024!.All fast hashes: $100 per hash. Bulk pricing for large dumps — contact us.
Send us: the hash value(s), any password policy info, and any partial password knowledge. The more context, the faster we crack it.
NTLM: $100 per hash. Bulk pricing for large dumps.
Send your hash. Free assessment, results in hours.