Identify possible hash types from a hash string, including MD5, NTLM, SHA variants, bcrypt, Argon2, Kerberos, ZIP, Office, PDF, SSH, RAR, and more.
Supported Tools:
Identify possible hash types from a hash string and view likely Hashcat modes, John formats, and matching algorithms.
A hash identifier helps determine what type of hash you are looking at based on its length, prefix, structure, and character pattern. It is useful during password auditing, CTF challenges, incident response, and forensic analysis when you need to decide which cracking format or tool workflow to use next.
Input:
$2b$12$C6UzMDM.H6dfI/f/IKcEeO7k7x2W0KJf7YbV6I1z6h6QYxY4YxY7e
Output:
1. bcrypt Confidence: High Hashcat mode: 3200 John format: bcrypt Notes: Modular crypt format bcrypt hash, commonly used for password storage.
What does a hash identifier do?
It checks the hash format, prefix, length, and character set to suggest possible algorithms or formats such as MD5, NTLM, SHA-256, bcrypt, Argon2, Kerberos, ZIP, Office, PDF, and SSH.
Can a hash identifier always detect the exact algorithm?
No. Some hashes share the same length and character format. For example, MD5, NTLM, and MD4 are all 32-character hexadecimal values, so the result may include multiple possible matches.
Why does the tool show Hashcat and John formats?
Hashcat modes and John formats help you choose the correct cracking workflow when you are testing passwords in an authorized audit, lab, or CTF environment.
What makes prefixed hashes easier to identify?
Formats such as bcrypt, Argon2, Kerberos, zip2john, office2john, pdf2john, and ssh2john include recognizable prefixes or structured fields, which makes detection more accurate.