— Hash Identifier

Free Hash Type Identifier

Quick Tips

  • This tool runs entirely in your browser - your data stays private.
  • Press Ctrl+V (Cmd+V on Mac) to quickly paste text.
  • Use the Copy button to save your result to clipboard.
  • Bookmark this page for quick access!

Identify the type of hash from its format and characteristics.

Your Recent Tools

Examples

Input
5d41402abc4b2a76b9719d911017c592
Output
MD5 (most likely), possibly NTLM, LM
Input
2fd4e1c67a2d28fced849ee1bb76e7391b93eb12
Output
SHA-1
Input
$2b$10$N9qo8uLOickgx2ZMRZoMye
Output
Bcrypt
Input
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Output
SHA-256

Why Use This Tool?

What problems does this solve?

When you encounter an unknown hash, you need to identify its type before you can work with it. This tool quickly analyzes hash characteristics to determine likely algorithms.

Common use cases:

  • Identifying unknown hashes in CTF challenges
  • Determining hash algorithms in legacy systems
  • Security research and penetration testing
  • Debugging authentication systems with unknown hash formats
  • Learning about different hash algorithm outputs

Who benefits from this tool?

CTF participants and security researchers. Penetration testers analyzing password databases. Developers debugging authentication systems. Anyone working with unknown hash formats.

Privacy first: All analysis happens locally in your browser. Your hashes never leave your device.

Frequently Asked Questions

No, this tool only identifies the hash type. Hashes are one-way functions and cannot be decrypted. Cracking involves trying many inputs until one matches, which this tool does not do.

Many hash algorithms produce outputs of the same length. For example, MD5 and NTLM both create 32-character hex strings. Without additional context, we can only list possibilities.

Identification based on format patterns is quite accurate, but not definitive. Self-identifying formats like bcrypt ($2b$) are unambiguous. Length-only identification may have multiple valid matches.

The hash may use an obscure algorithm, be truncated or corrupted, or be a custom/proprietary format. Try checking the source documentation or examining where the hash was generated.

Yes! Hash identification is often the first step in cracking challenges. Knowing the hash type helps choose the right tool (hashcat, john) and appropriate wordlists or rules.

Salted hashes include random data mixed with the input, making rainbow tables ineffective. Modern password hashes like bcrypt are always salted. Simple hashes like raw MD5/SHA are typically unsalted.