HashData – A Command-line Hash Identifying Tool

Outsmart Malicious Hackers


HashData is a Ruby-based command-line REPL Hash Identifying Tool with support for a lot of different (most popular) hash types.

HashData - A Command-line Hash Identifying Tool

Installation

Usage

Command Line

When installed, run hashdata and paste in hashes when prompted.

Library

Example Script:

The above should output true. The library only matches the start of your second input, this means that you can check something is an MD5 hash without having to worry about if it is from Joomla or Unix for example.


Hashes Supported

  • Adler32
  • Blowfish(Eggdrop), Blowfish(OpenBSD)
  • CRC-16, CRC-16-CCITT
  • CRC-32, CRC-32B
  • CRC-96(ZIP)
  • Domain Cached Credentials, Domain Cached Credentials 2
  • DES(Unix), DES(Oracle)
  • FCS-16, FCS-32
  • FNV-132, FNV-164
  • GOST R 34.11-94
  • GHash-32-3, GHash-32-5
  • Haval-128, Haval-160, Haval-192, Haval-224, Haval-256
  • Joaat
  • Lineage II C4
  • LM
  • Lotus Domino
  • MD2, MD4, MD5
  • MD5(Joomla), MD5(osCommerce), MD5(PalshopCMS)
  • MD5(APR), MD5(Cisco PIX), MD5(Unix)
  • MD5(IP.Board), MD5(MyBB), MD5(phpBB3), MD5(WordPress)
  • MySQL3.x, MySQL4.x, MySQL5.x
  • MSSQL(2000), MSSQL(2005), MSSQL(2008)
  • NTLM
  • RAdmin v2.x
  • RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320
  • SAM(LM_Hash:NT_Hash)
  • SHA-1, SHA-1(Django), SHA-1(MaNGOS), SHA-1(MaNGOS2)
  • SHA-224
  • SHA-256, SHA-256(Django), SHA-256(Unix)
  • SHA3-224, SHA3-256, SHA3-384, SHA3-512
  • SHA-384, SHA-384(Django)
  • SHA-512, SHA-512(Drupal), SHA-512(Unix)
  • SSHA-1
  • Skein-256, Skein-256(128), Skein-256(160), Skein-256(224)
  • Skein-512, Skein-512(128), Skein-512(160), Skein-512(224), Skein-512(256), Skein-512(384)
  • Skein-1024, Skein-1024(384), Skein-1024(512)
  • Snefru-128, Snefru-256
  • Tiger-128, Tiger-160, Tiger-192
  • VNC
  • Whirlpool
  • XOR-32

You can download HashData here:

HashData-v0.0.3.zip

Or read more here.

Posted in: Cryptography, Hacking Tools, Password Cracking

, , ,


Latest Posts:


Terabytes Of US Military Social Media Spying S3 Data Exposed Terabytes Of US Military Social Media Spying S3 Data Exposed
Once again the old, default Amazon AWS S3 settings are catching people out, the US Military has left terabytes of social media spying S3 data exposed.
SNIFFlab - Create Your Own MITM Test Environment SNIFFlab – Create Your Own MITM Test Environment
SNIFFlab is a set of scripts in Python that enable you to create your own MITM test environment for packet sniffing through a WiFi access point.
Skype Log Viewer Download - View Logs on Windows Skype Log Viewer Download – View Logs on Windows
Skype Log Viewer allows you to download and view the Skype history and log files, on Windows, without actually downloading the Skype client itself.
Ethereum Parity Bug Destroys Over $250 Million In Tokens Ethereum Parity Bug Destroys Over $250 Million In Tokens
If you are into cryptocurrency or blockchain at all, you will have heard about the Ethereum Parity Bug that has basically binned $280 Million + ETH.
WPSeku - Black-Box Remote WordPress Security Scanner WPSeku – Black-Box Remote WordPress Security Scanner
WPSeku is a black box WordPress Security scanner that can be used to scan remote WordPress installations to find security issues and vulnerabilities.
Malaysia Telco Hack - Corporations Spill 46 Million Records Malaysia Telco Hack – Corporations Spill 46 Million Records
The Malaysia Telco Hack has been blowing up in the news with over 42 Million Records being leaked including IMEI numbers, SIM details and home addresses.


One Response to HashData – A Command-line Hash Identifying Tool

  1. Volker April 13, 2017 at 5:46 am #

    You do not need a full dev environment to identify hashes. I simply wrapped the available data into a one-page JavaScript application:  https://www.wyae.de/docs/hashid/