Hash Identifier

Paste any hash - get the top-3 most likely hash type guesses based on length, charset, and structural prefix patterns.

Examples
Click to load and identify
MD5: 5d41402abc4b2a76b9719d911017c592
SHA-1: aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d
SHA-256: 2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824
SHA-512: 9b71d224…dec043
bcrypt: $2a$12$R9h/cIPz…
Argon2id: $argon2id$v=19$m=65536,t=3,p=4$…
SHA-512crypt: $6$rounds=5000$…
LM hash (empty password): aad3b435b51404eeaad3b435b51404ee
NTLM ("password"): 8846f7eaee8fb117ad06bdd830b7586c
MySQL5: *94BDCEBE19083CE2A1F959FD02F964C7AF4CFC29
How identification works

This tool inspects four signals - length, charset (hex / base64 / printable), structural prefix (e.g. $2a$ for bcrypt, $6$ for SHA-512crypt, $argon2 for Argon2), and known anchor patterns (e.g. aad3b435b51404eeaad3b435b51404ee = empty-LM). It scores every candidate hash type against the input and returns the top 3 with confidence scores.

Identification is heuristic - a 32-character hex string could be MD5, MD4, MD2, NTLM, or a Haval-128. Length alone is not enough. Use the algorithm spec link to confirm.

Reference: Hashcat example hashes · hash-identifier (Python original)

Note: This tool only identifies hash types - it does not crack hashes. For online hash cracking, use a dedicated cluster like Hashcat or John the Ripper. CyberTools is 100% client-side and never sends your hash anywhere.