Free Hash Identifier
Identify any hash type from its format and length
Paste any hash string to identify its algorithm. This tool analyzes the hash length, character set, and common prefixes to determine whether it's MD5, SHA-1, SHA-256, SHA-512, bcrypt, argon2, scrypt, NTLM, or another format — with confidence ratings and security recommendations.
Trusted by teams at
How it works
How Hash Identifier works
Paste your hash
Paste any hash value — from a database dump, password file, forensic image, or application log. Supports all common hash formats including salted and prefixed variants.
Pattern analysis
The tool examines the hash's length, character set, and structural patterns (like bcrypt's $2b$ prefix or argon2's $argon2id$ prefix) to narrow down the algorithm.
Get identification results
Receive a ranked list of possible algorithms with confidence levels, security assessment of the hash type, and recommendations for migration if it's a weak algorithm.
Features
What Hash Identifier checks
Detect 10+ hash algorithms
Identifies MD5, SHA-1, SHA-256, SHA-384, SHA-512, bcrypt, scrypt, argon2 (id/i/d), NTLM, and MySQL hashes based on length, encoding, and prefix patterns.
Recognize salted and prefixed hashes
Correctly identifies modular crypt format hashes like $2b$ (bcrypt), $6$ (SHA-512 crypt), $5$ (SHA-256 crypt), $argon2id$, and $scrypt$ with their parameters.
Assess hash security strength
Rates each identified algorithm on its resistance to brute-force attacks and recommends modern alternatives for weak algorithms like MD5 or SHA-1.
Handle multiple encoding formats
Supports hex-encoded, base64-encoded, and raw prefixed hash formats. Automatically detects the encoding before analyzing the underlying algorithm.
Provide cracking difficulty estimates
Gives context on how resistant the hash is to offline attacks, including approximate time-to-crack estimates for common password patterns.
Use cases
Who should use the free Hash Identifier
Penetration Testers
Quickly identify hash types found in database dumps, configuration files, or captured credentials during an engagement to choose the right cracking approach.
Security Auditors
Verify that applications use strong, modern hashing algorithms (bcrypt, argon2) instead of deprecated ones (MD5, SHA-1) during code reviews and compliance audits.
Forensic Analysts
Identify unknown hash formats encountered during incident response and digital forensics investigations to understand what systems or applications produced them.
More tools
All free security tools
Scanners
(10)Checkers
(7)Decoders & Generators
(2)FAQ
Frequently asked questions
Everything you need to know about the free Hash Identifier.
Go beyond Hash Identifier
This free Hash Identifier checks a handful of things. Maced's AI pentest checks thousands.
Get a full autonomous penetration test — including OWASP Top 10, authentication flaws, business logic errors, API security, and more — with a compliance-ready report in hours.
Proof of exploit on every finding · SOC 2 & ISO 27001 compatible