Nitrxgen
Hash Generator

There's a fair share of online hash generators already, infact I had one before, but it needed some re-designing.
So what is a hash generator? it generates hashes obviously.. alright, it generates cryptographic hashes or "fingerprints" and they're used for a number of things, such as file verifcation/validation, checksums, or for storing irreversable and unique passwords.. and you can produce your own hashes right here!
There are numerous algorithms to produce hashes, all which are done simultaneously here..
The algorithms in action were ported from other languages to PHP, and the ones I have trouble with are executed via external application (ideally they should all be calculated in C for speed, but eh).
Data submitted to this page are NOT saved or recorded for any purpose.
Update 14/02/14: added the Cisco ASA algorithm by request of a user.
Update 24/08/10: added a bunch of forum hashes, added the "Dependencies" column and added credits at the bottom.
Update 23/08/10: the CRC calculations will be re-coded at some point to have more customizable polynomials and attributes.

Password:
Password Salt:
Username:
Please Note: if some hashes look identical, it may be because some require a salt or username to produce a unique hash.
The dependencies on the right column shows what information is used by the algorithm, whether it be password, salt or username.

Algorithm Result Hash Dependencies
Cached Domain CredentialsBE6BC64C­94BBC062­BCEBFB40­B4F93304pass, user
RadioGatúnF30028B5­4AFAB6B3­E55355D2­77711109­A19BEDA7­091067E9­A492FB5E­D9F20117pass
MySQL v3.2350305735­12345671pass
MySQL v5BE1BDEC0­AA74B4DC­B079943E­70528096­CCA985F8pass
Cisco PIX8Ry2YjIy­t7RRXU24pass
NTLM31D6CFE0­D16AE931­B73C59D7­E0C089C0pass
LMAAD3B435­B51404EE­AAD3B435­B51404EEpass
RIPE-MD128CDF26213­A150DC3E­CB610F18­F6B38B46pass
RIPE-MD1609C1185A5­C5E9FC54­61280897­7EE8F548­B2258D31pass
RIPE-MD25602BA4C4E­5F8ECD18­77FC52D6­4D30E37A­2D9774FB­1E5D0263­80AE0168­E3C5522Dpass
RIPE-MD32022D65D56­61536CDC­75C1FDF5­C6DE7B41­B9F27325­EBC61E85­57177D70­5A0EC880­151C3A32­A00899B8pass
GHash v300000000pass
GHash v500000000pass
XOR800pass
BKDR00000000pass
Message Digest v28350E5A3­E24C153D­F2275C9F­80692773pass
Message Digest v431D6CFE0­D16AE931­B73C59D7­E0C089C0pass
Message Digest v5D41D8CD9­8F00B204­E9800998­ECF8427Epass
Whirlpool v219FA61D7­5522A466­9B44E39C­1D2E1726­C5302321­30D407F8­9AFEE096­4997F7A7­3E83BE69­8B288FEB­CF88E3E0­3C4F0757­EA8964E5­9B63D937­08B138CC­42A66EB3pass
Adler801pass
Adler160001pass
Adler3200000001pass
DJB v100001505pass
DJB v200001505pass
SDBM00000000pass
Shift Add XOR (SAX)00000000pass
FNV v0 (32-bit)00000000pass
FNV v0 (64-bit)00000000­00000000pass
FNV v1 (32-bit)811C9DC5pass
FNV v1 (64-bit)CBF29CE4­84222325pass
FNV v1A (32-bit)811C9DC5pass
FNV v1A (64-bit)CBF29CE4­84222325pass
Bob Jenkins' One at a Time00000000pass
Fletcher800pass
Fletcher160000pass
Fletcher3200000000pass
SHA-1DA39A3EE­5E6B4B0D­3255BFEF­95601890­AFD80709pass
SHA-224D14A028C­2A3A2BC9­476102BB­288234C4­15A2B01F­828EA62A­C5B3E42Fpass
SHA-256E3B0C442­98FC1C14­9AFBF4C8­996FB924­27AE41E4­649B934C­A495991B­7852B855pass
SHA-38438B060A7­51AC9638­4CD9327E­B1B1E36A­21FDB711­14BE0743­4C0CC7BF­63F6E1DA­274EDEBF­E76F65FB­D51AD2F1­4898B95Bpass
SHA-512CF83E135­7EEFB8BD­F1542850­D66D8007­D620E405­0B5715DC­83F4A921­D36CE9CE­47D0D13C­5D85F2B0­FF8318D2­877EEC2F­63B931BD­47417A81­A538327A­F927DA3Epass
Tiger1924635FFF6­A778CC24­3DA15C69­594E98E7­9451256E­680B4E80pass
Sum800pass
Sum160000pass
Sum24000000pass
Sum3200000000pass
PJW3200000000pass
ELF3200000000pass
CRC800pass
CRC160000pass
CRC16-CCITTFFFFpass
CRC16-CCITT (Kermit)0000pass
CRC16-DNPFFFFpass
CRC16-SICK0000pass
CRC16-IBM0000pass
CRC16-x250000pass
CRC16-XMODEM0000pass
CRC16-ZMODEM0000pass
CRC24B704CEpass
CRC3200000000pass
CRC32 IEEE 802.300000000pass
CRC32-BZIP200000000pass
CRC6400000000­00000000pass
CRC64-ECMA00000000­00000000pass
Invision Power Board (IPB) v2.x
myBB Forum v1.2.x
020EB29B­524D7BA6­72D9D48B­C72DB455pass, salt
SMF v1.1.x / v2.0.xDA39A3EE­5E6B4B0D­3255BFEF­95601890­AFD80709pass, user
vBulletin v3.x.x
IceBB
74BE1697­9710D4C4­E7C66478­56088456pass, salt
RAdmin v2.x6D0BB009­54CEB7FB­EE436BB5­5A8397A9pass
Woltlab BB3E6C06B1­A28A035E­21AA0A73­6EF80AFA­DC43122Cpass, salt
DLP74BE1697­9710D4C4­E7C66478­56088456pass, salt
EyeOS v1.8.5.374BE1697­9710D4C4­E7C66478­56088456pass
Joomla v1.5.15D41D8CD9­8F00B204­E9800998­ECF8427Epass, salt
MediaWiki >= v1.1.074BE1697­9710D4C4­E7C66478­56088456pass, salt
osCommerceD41D8CD9­8F00B204­E9800998­ECF8427Epass, salt
Double MD5 (raw)59ADB24E­F3CDBE02­97F05B39­5827453Fpass
Double MD5 (lower-hex)74BE1697­9710D4C4­E7C66478­56088456pass
Double MD5 (upper-hex)80404D0C­6D24E87F­650FF7D1­985CD762pass
Double SHA1 (raw)BE1BDEC0­AA74B4DC­B079943E­70528096­CCA985F8pass
Double SHA1 (lower-hex)10A34637­AD661D98­BA334471­7656FCC7­6209C2F8pass
Double SHA1 (upper-hex)4026E982­E356B8AF­F02CAA26­01C6BCB1­7FB5C645pass


Another Note about Forum Hashes:
Sometimes in databases, you'll have a hash that might not look the same as the ones shown here, maybe the wrong length or something.. when in databases, they could be displayed with the hash next to them separated by the colon symbol, and the salt typically won't be anything that reads much to a human (usually a string of characters, numbers, symbols in random order) so you might have something like this:
So basically, different forum software might use different kinds of salts.. please know what you're doing if you wish to produce some actual possible values for these!

Looking for more Algorithms:
There are a couple of attempts at porting some other algorithms into this, but none returned an expected value, I have no idea why.. so if somebody out there is willing to help me port some algorithmic code, then please contact me! Such algorithms like SHA0, DHA256, XUM32..

Credits to the Algorithms:
Thanks to PasswordsPro for listing forums' password cryptography.
Thanks to Fsum Frontend for their Java source of some of their algorithms for me to port to PHP.
Thanks to the Wikipedia article on CRC checksums (I will be implementing a CRC calculator at some point).
Thanks to Eternally Confuzzled for going into detail about the smaller algorithms, with codes too.
Thanks to Lammert Bies for some great information on CRC calculations (and for the C code which I ported to PHP).
Thanks to JSSHA for the SHA-224 code which I ported to PHP.

And thanks to a few dozen forum articles which have helped me confirm the validation of the algorithms (there were a lot, and my browsing history is absolutely ruined).


© Copyright 2008-2010: Nitrxgen, all rights reserved.
Valid HTML 4.01 Transitional
Last modified: 14th Feb, 2014, 12:54am GMT robots robots