Hash Crack v3 password cracking manual

    Hash Crack v3

    The Hash Crack: Password Cracking Manual v3 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis techniques. Hash Crack contains all the tables, commands, online resources, and more to complete your cracking security kit.

    operator handbook red team osint blue team

    Operator Handbook

    The Operator Handbook takes three disciplines (Red Team, OSINT, Blue Team) and combines them into one complete reference guide. The book contains 123 individual cheat sheet references for many of the most frequently used tools and techniques by practitioners.

    red team planner

    Red Team Planner

    Pentest Engagement Note Taking

    Red Team Planner is a must for network pentester’s who manage multiple customer engagements. Includes custom designed engagement templates to help track customer requirements, tool deployments, team member tasks, and other vital data points essential to a successful network assessment.

    Blue Team Planner

    Blue Team Planner

    Blue Team Planner is a must for network defenders, incident responders, and those who manage multiple breach events. Includes custom designed incident templates to help track indicators of compromise (IOC), forensic tool deployments, team member tasks, timelines, affected machines, and other vital data points essential to a successful breach event response.

    One Time Grid Random Password Book

    One-Time Grid

    One-Time Grid: Random Password Book was created to help novice and technical users generate truly random, secure passwords for all your Internet website accounts and home network devices. Using industry standard, cryptographically random generation, One-Time Grid provides generated tables for users to select unique random data when creating new passwords.

  • BLOG


    June 6, 2022 · cybersecurity,kids picture book,unicorn book,beacon and bot,kids book
    March 20, 2020 · red team,osint,blue team,network defense,network security
    January 1, 2020 · ip reputation,blacklist,log analysis,ip scanning,greynoise
    August 28, 2019 · Password Cracking,Cyber Security,pentration testing,passwords,password hash
    May 30, 2019 · blue team,incident response,threat hunt,breach,cyber security
    February 1, 2019 · Password Cracking,Hash crack,passwords,red team,pentest
    More Posts

    NETMUX is a multi-disciplinary network security solutions company.


    With over 14 years of experience dealing with advanced threat actors from around the world, we support organizations in helping them improve their risk assessment and security solutions posture.

    network security defense

    Network Defense

    Is your network defense strategy properly engineered?

    Our team of engineers will conduct an assessment and help your organization develop an effective cyber and physical defensive strategy to protect your company's most sensitive data.

    pentest alert

    Penetration Testing

    How vulnerable are your assets to an attack?

    Using the latest cyber threat actor methodologies our team of security engineers will attempt to locate and report vulnerabilities in your organization's application and network infrastructure. Recommended solutions will accompany a detailed report of the findings.

    red team cyber flag

    Red Team Operations

    Complete organizational security assessment.

    The full-spectrum of security assessments is directed at your organization's infrastructure and its employees. A dedicated team will use remote exploitation, social-engineering, email spear-phishing campaigns, and physical penetration of your organization's location.

    network forensic magnifying glass

    Network and Hardware Forensics

    Have you audited your network assets lately?

    Full network data and hardware forensic analysis looking for existing or potential compromise of your organization's infrastructure. Onsite engineers placing sensors and surveying your networks data packets and systems culminating in a highly detailed report of the findings.

    network analysis security

    Network Analysis

    What information can be easily discovered about your network?

    Think your network assets are hidden? Our team will conduct an extensive analysis of what information can be easily obtained about your organization and its infrastructure and provide a detailed report of the findings.

    wireless network security

    Wireless Network Assessment

    Is your organization's wireless network vulnerable?

    A dedicated team will travel to your organization's location and conduct a full security audit of your wireless infrastructure. Includes testing for vulnerability to rogue access points and wireless cryptographic vulnerabilities.

    cyber threat report

    Security Reporting

    Detailed reports on your infrastructure posture.

    Automated reporting on your network infrastructure posture and alerts on possible vulnerabilities. Provide a list of ip address ranges or domain names and we will monitor the health and well being of your assets.

    cloud security

    Cloud Based Infrastructure

    Have you migrated to the cloud?

    The cloud offers cost effective data storage and services hosting solutions but requires different defense methodologies. We can assess whether your data and services are configured properly for a cloud environment and offer solutions.


    We served our country and now we are here to serve you.

    Netmux is composed of Armed Forces Veterans with over 14 years in the cyber attack and defense arena. Based out of Northern Virginia (NOVA), a stone's throw from Washington D.C., our company is entrenched in one of the most geographically key areas in network security. Brimming with talent from local universities and the defense sector, NOVA has become a home to some of the biggest names in the cyber security industry: Mandiant, Symantec, Amazon, Verizon, and Verisign. Netmux is proud to stand among these giants and offer the same level of world-class network security service, with a more tailored experience. We look forward to every new challenge presented to us by our customers and remain dedicated to their protection and satisfaction.

    *Proudly Veteran-Owned and operated company


    Cause everybody else is doing it...join the herd!

    twitter netmux logo





    Github netmux logo





    instagram netmux logo









All Posts
Terms & Conditions
This privacy policy discloses the privacy practices for netmux.com. This privacy policy applies solely to information collected by this web site. It will notify you of the following:

    What personally identifiable information is collected from you through the web site, how it is used and with whom it may be shared.
    What choices are available to you regarding the use of your data.
    The security procedures in place to protect the misuse of your information.
    How you can correct any inaccuracies in the information.

Information Collection, Use, and Sharing
We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell or rent this information to anyone.

We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary to fulfill your request, e.g. to ship an order.

Unless you ask us not to, we may contact you via email in the future to tell you about specials, new products or services, or changes to this privacy policy.

Your Access to and Control Over Information
You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:

   • See what data we have about you, if any.

   • Change/correct any data we have about you.

   • Have us delete any data we have about you.

   • Express any concern you have about our use of your data.

We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.

Wherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a closed lock icon at the bottom of your web browser, or looking for "https" at the beginning of the address of the web page.

While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.

In order to use this website, a user must first complete the registration form. During registration a user is required to give certain information (such as name and email address). This information is used to contact you about the products/services on our site in which you have expressed interest. At your option, you may also provide demographic information (such as gender or age) about yourself, but it is not required.

We use "cookies" on this site. A cookie is a piece of data stored on a site visitor's hard drive to help us improve your access to our site and identify repeat visitors to our site. For instance, when we use a cookie to identify you, you would not have to log in a password more than once, thereby saving time while on our site. Cookies can also enable us to track and target the interests of our users to enhance the experience on our site. Usage of a cookie is in no way linked to any personally identifiable information on our site.

Some of our business partners may use cookies on our site (for example, advertisers). However, we have no access to or control over these cookies.

We share aggregated demographic information with our partners and advertisers. This is not linked to any personal information that can identify any individual person.

We partner with another party to provide specific services. When the user signs up for these services, we will share names, or other contact information that is necessary for the third party to provide these services. These parties are not allowed to use personally identifiable information except for the purpose of providing these services.

If your site has links to other sites, you might insert a paragraph like this in your privacy policy:

This web site contains links to other sites. Please be aware that we are not responsible for the content or privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of any other site that collects personally identifiable information. 

Our Privacy Policy may change from time to time and all updates will be posted on this page.

If you feel that we are not abiding by this privacy policy, you should contact us immediately via email.