A modern hash identification tool that names MD5, SHA256, and 300+ other hash types with popularity ratings and summaries.
Name That Hash is a tool that identifies the type of cryptographic hash from a given string, such as MD5, SHA256, or NTLM. It helps security researchers, penetration testers, and developers quickly determine hash algorithms for tasks like password cracking or forensic analysis. The tool includes a web app, CLI, and API for flexible usage.
Security professionals, penetration testers, and developers who work with hash analysis, password recovery, or cybersecurity assessments and need to identify unknown hash types efficiently.
It offers modern features like popularity-based ranking, hash summaries, and accessibility options, setting it apart from outdated alternatives like HashID. Its extensible design and regular updates ensure it stays relevant for contemporary security needs.
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Last updated in 2021, unlike alternatives like HashID (2015), ensuring it stays current with modern hash types and security needs.
Prioritizes commonly used hashes such as NTLM over less common ones, improving identification accuracy for real-world scenarios as demonstrated in comparisons.
Offers color output designed for accessibility and options like --accessible to remove ASCII art, making it usable with screen readers and in accessible workflows.
Allows easy addition of new hash types through simple edits to the hashes.py file, keeping the tool adaptable to emerging algorithms.
Provides JSON output and can be imported as a Python module, enabling seamless use in custom security scripts and tools for automation.
Using the --accessible flag removes least likely hash matches, which could lead to missing identifications for rare or obscure hash types.
Installation via pip means it relies on Python being available, which might not be ideal for all security environments or systems without Python support.
It only identifies hash types and doesn't perform cracking, so users must pair it with other tools like HashCat for complete password recovery workflows.