![[hashtopia-banner.jpg]]
## Hashtopia
**Hashtopia is a knowledge base for password security.**
It focuses on cryptographic hashes, password analysis, attack methodology, and the tools and data used to understand how real-world passwords fail and how they can be better protected.
This site brings together **concepts, research, analysis techniques, and tooling** used by security professionals, students, and researchers working in offensive and defensive security, auditing, and education. The goal is not exploitation, but **visibility**: understanding how passwords behave in practice so systems can be designed and secured more effectively.
Whether you are learning the fundamentals of cryptographic hashing, analyzing password entropy and reuse, or exploring how attackers and defenders evaluate password strength, Hashtopia is intended to serve as a **reference and learning resource**.
With the latest content update, you may notice that there are more references to **attack paths** and related subjects appearing through out the site. This is a deliberate change that will be slowly integrated across the entire body of knowledge. SpecterOps, the creators of BloodHound, have been producing interesting research and tooling as they demystify the Identity Attack path problem. Since passwords are used in many access schemes, we can use the BloodHound Graph to visualize how credentialed access functions in organizations and really develop an understanding of how far reaching a particular password or hash can go in the world.
---
### What you’ll find here
- **[[1. Concepts|Concepts]]** – Plain-language explanations of cryptographic hashes, password theory, entropy, and related fundamentals. Also, [[Concept Application - HashCat|Concept Applications]] can be found in this section and are popular 'follow along' resources.
- **[[1. Foundational Approach to Password & Hash Analysis|Methodology]]** – How password and hash analysis is performed in real environments
- **[[Password Analysis Findings]] & Data** – Research-oriented breakdowns of password behavior and patterns
- **[[Resources|Tools & Resources]]** – Utilities, wordlists, and references commonly used in security research
- **[[Training|Education-focused material]]** – Content designed to support learning, labs, and legitimate security testing
---
### Intended use
All content on Hashtopia is provided **for educational, research, and defensive security purposes only**. Understanding how passwords fail is a prerequisite to improving identity security, authentication design, and user protections.
### Popular Neural Pockets
- 🗝️ [[1. Foundational Approach to Password & Hash Analysis|Methodology]]
- [[Getting Started with Hashtopia]]
- [[3. General Methodology|General Methodology]]
- [[2. Cracking Methodology|Cracking Methodology]]
- [[1. Foundational Approach to Password & Hash Analysis|Foundational Approach]]
- [[4. General Checklist|General Checklist]]
- 🧠 [[1. Concepts|Concepts]]
- [[Password Entropy]]
- [[Cryptographic Hashing]]
- [[Markov-Chains]]
- [[Probabalistic Context Free Grammer (PCFG)]]
- 📊 Analysis
- [[Password Analysis Findings]]
- [[Password Research]]
- [[Password Pattern Analysis]]
# Tools
- 🪅 Password Cracking
- [[Concept Application - HashCat|HashCat]]
- [[Concept Application - John the Ripper|JohntheRipper]]
- 🔎 Password Analysis
- [[PACK - Password Analysis and Cracking Kit]]
- [[PIPAL - Password Intelligence and Pattern Analysis]]
- 📚 Data Manipulation
- [[WordList Manipulation]]
- [[Wordlists and Dictionaries]]
# Resources
- 💼 Wordlists
- [[Wordlists and Dictionaries]]
- [[Custom Dictionary Generation]]
- [[Advanced Compositional Attacks]]
- 💰 Writeups
- [[Collection_1 - Anti-Public Dump - Stats and Analysys|Anti-Public]]
- [[TeamHashCat - CMIYC 2021]]
- [[TeamHashCat - CMIYC 2022]]
- [[TeamHashCat - HashRunner]]
- 👥 Processing Guides
- [[Windows Domain Password Hashes]]
- [[Windows Local Password Hashes]]
- [[PCAP - Wireless Passwords]]
- 🐈 Hashtopia.blog
- Coming Soon!
- 👾 Fun
- [[Extreme Hashes]]
- [[Password Cracking Competitions]]
- [[Password Cracking Hardware Construction Guide]]