types of hashes
|:—–|:—–| |Original text|welcome| |Original bytes|77:65:6c:63:6f:6d:65 (length=7)| |Adler32|0bda02ed| |CRC32|37cb61b3| |Haval|13a2b3f145eddce8afa6498001597ba7| |MD2|f67b83e43040206d097881e25d95c6a3| |MD4|75a1ca2ed80f04dd6fe782460b210156| |MD5|40be4e59b9a2a2b5dffb918c0e86b3d7| |RipeMD128|11445cca012178b3450ee6ce0230bd9f| |RipeMD160|7a0654908d0dd3fec975f748df60cc854e13c4af| |SHA-1|c0b137fe2d792459f26ff763cce44574a5b5ab03|
tools
Acccheck, bruteSpray, Burp Suite, CeWL, chntpw, cisco-auditing-tool, CmosPwd, creddump, Crowbar, crunch, DBPwAudit, findmyhash, gpp-decrypt, hash-identifier, Hashcat, HexorBase, THC, John the Riper, johnny, keimpx, Maltego Teeth, Maskprocessor, multiforcer, NcracK, oclgausscrack, ophcrack, PACK, patator, phrasendrescher, polenum, RainbowCarck, rcracki-mt, RSMangler, SecLists, SQLdict, Statsprocessor, THC-pptp-brute, TrueCrack, WebScarab, wordists, zaraproxy.
john the ripper