This is an example of how using a password list and inputs can be used to crack a sha256. Subdomain Enumerator