Identify Hash Algorithm
Paste any hash to detect the algorithm by analysing its length, character set, and structure.
Results will appear here after analysis.
Hash Text
Type or paste any text to generate hashes instantly. Tap a result card to copy.
Hash File
Upload any file to compute its cryptographic hashes. All processing is local — nothing is uploaded to any server.
Click to browse or drag & drop any file
Any file type · Processed entirely in your browser
Encode & Decode
Convert between encoding formats. Both directions work live.
Compare Hashes
Paste two hashes to check if they match. Case-insensitive.
Hashcat & John the Ripper
Reference for hash modes and format identifiers. Click any block or badge to copy the command.
Hashcat
Dictionary Attack (-a 0)
hashcat -m [MODE] -a 0 hashes.txt rockyou.txt
click to copy
Brute-Force (-a 3)
hashcat -m [MODE] -a 3 hashes.txt ?a?a?a?a?a?a?a?a
click to copy
Rule-Based (-a 0 -r)
hashcat -m [MODE] -a 0 hashes.txt rockyou.txt -r rules/best64.rule
click to copy
Show Cracked
hashcat -m [MODE] hashes.txt --show
click to copy
John the Ripper
Wordlist Attack
john --format=[FORMAT] --wordlist=rockyou.txt hashes.txt
click to copy
Incremental (Brute-Force)
john --format=[FORMAT] --incremental hashes.txt
click to copy
Show Cracked
john --show --format=[FORMAT] hashes.txt
click to copy
List All Formats
john --list=formats
click to copy
Hashcat Mask Charset
?l = a–z
?u = A–Z
?d = 0–9
?s = special chars
?a = ?l+?u+?d+?s
?b = 0x00–0xff
?h = 0–9, a–f
?H = 0–9, A–F
Mode & Format Reference
| Algorithm | Hashcat | JtR Format | Bits | Security | Example |
|---|