Comes with bot trigger and custom alias. Searches the rednoize database for specified MD5 hash. Note this though: this code DOES NOT decrypt MD5 hash. Why? Because it isn't possible. This is simply searching a database of known matches. Do NOT get surprised if it does not decrypt whatever you searched for.
Also, idea came from http://www.hawkee.com/snippet/7440/ (thanks armagidon!)
(1:22(38) PM) <@TheNitelyfe> @md5 de18e6b63a3c9e2e9504410b30b656df
(1:22(39) PM) <@BluePrint> Searching database for de18e6b63a3c9e2e9504410b30b656df...
(1:22(39) PM) <@BluePrint> Found! Result: wooo
on $*:TEXT:/^[!@.]md5 (.+)/Si:#:{
if (!$sock(md5)) && (!$(,$+(%,flood,$nick))) {
set -u3 $+(%,flood,$nick) on
sockopen md5 md5.rednoize.com 80
sockmark md5 $regml(1) < $+ $iif($left($1,1) == @,msg #,.notice $nick)
$iif($left($1,1) == @,msg #,.notice $nick) Searching database for $regml(1) $+ ...
}
}
alias md5d {
if (!$sock(md5)) {
sockopen md5 md5.rednoize.com 80
sockmark md5 $1 <echo -a
echo -a Searching database for $1 $+ ...
}
}
on *:sockopen:md5:{
var %x sockwrite -nt md5, %y $token($sock(md5).mark,1,60)
%x GET $+(/?q=,%y) HTTP/1.1
%x Host: md5.rednoize.com $str($crlf,2)
}
on *:sockread:md5:{
if ($sockerr) { $token($sock(md5).mark,2,60) Error: $sock(md5).wsmsg }
var %md5
sockread %md5
if ($regex(%md5,/<div id="result" >(.+)<\/div>/)) {
var %x $md5($regml(1))
$token($sock(md5).mark,2,60) $iif(%x !isin $sock(md5).mark,Not found in database,Found! Result: $regml(1))
sockclose md5
}
}
So this is like a semi-md5 cracker then? :P I know there is a site at this address:http://md5.noisette.ch/index.php You can check it out. I did a md5 hashed: > 54b0c58c7ce9f2a8b551351102ee0938, and I placed that into their search box, waited a few moments, and they gave me the correct result:> this is a test
But then again, md5 was created to be irreversible...