Free Hash Identifier

Identify any hash type from its format and length

Paste any hash string to identify its algorithm. This tool analyzes the hash length, character set, and common prefixes to determine whether it's MD5, SHA-1, SHA-256, SHA-512, bcrypt, argon2, scrypt, NTLM, or another format — with confidence ratings and security recommendations.

Trusted by teams at

Ramp
Pilot
Vercel
Stripe
Better Auth
SST
OpenCode

How it works

How Hash Identifier works

01

Paste your hash

Paste any hash value — from a database dump, password file, forensic image, or application log. Supports all common hash formats including salted and prefixed variants.

02

Pattern analysis

The tool examines the hash's length, character set, and structural patterns (like bcrypt's $2b$ prefix or argon2's $argon2id$ prefix) to narrow down the algorithm.

03

Get identification results

Receive a ranked list of possible algorithms with confidence levels, security assessment of the hash type, and recommendations for migration if it's a weak algorithm.

Features

What Hash Identifier checks

Detect 10+ hash algorithms

Identifies MD5, SHA-1, SHA-256, SHA-384, SHA-512, bcrypt, scrypt, argon2 (id/i/d), NTLM, and MySQL hashes based on length, encoding, and prefix patterns.

Recognize salted and prefixed hashes

Correctly identifies modular crypt format hashes like $2b$ (bcrypt), $6$ (SHA-512 crypt), $5$ (SHA-256 crypt), $argon2id$, and $scrypt$ with their parameters.

Assess hash security strength

Rates each identified algorithm on its resistance to brute-force attacks and recommends modern alternatives for weak algorithms like MD5 or SHA-1.

Handle multiple encoding formats

Supports hex-encoded, base64-encoded, and raw prefixed hash formats. Automatically detects the encoding before analyzing the underlying algorithm.

Provide cracking difficulty estimates

Gives context on how resistant the hash is to offline attacks, including approximate time-to-crack estimates for common password patterns.

Use cases

Who should use the free Hash Identifier

Penetration Testers

Quickly identify hash types found in database dumps, configuration files, or captured credentials during an engagement to choose the right cracking approach.

Security Auditors

Verify that applications use strong, modern hashing algorithms (bcrypt, argon2) instead of deprecated ones (MD5, SHA-1) during code reviews and compliance audits.

Forensic Analysts

Identify unknown hash formats encountered during incident response and digital forensics investigations to understand what systems or applications produced them.

FAQ

Frequently asked questions

Everything you need to know about the free Hash Identifier.

Go beyond Hash Identifier

This free Hash Identifier checks a handful of things. Maced's AI pentest checks thousands.

Get a full autonomous penetration test — including OWASP Top 10, authentication flaws, business logic errors, API security, and more — with a compliance-ready report in hours.

Proof of exploit on every finding · SOC 2 & ISO 27001 compatible