Searching protocol for "hash-identification"
Crack hashes and credential attacks fast.
Crack offline hashes and encrypted files.