Version 1.3.4 En.

Hash-decryptor - 8 algorithms

Words count in the first dictionnary Loading...
ASCII set :
Options :
Hash algorithm to use :

This is a demo page of the features of the program. Consequently, the brutforce method might not work correctly owed to the limitations of the server. To take advantage of the full power of the brutforce method, you can download the source code HERE.

How does it work ?

  1. Research in the dictionnary
  2. Research by the brutforce method

First, we check the most used passwords in a big dictionnary.

Any hash algorithm (such as MD5) computes a "fingerprint" proper and unique to each string.
The problem is that being a fingerprint, it doesn't contains the information (the string) itself. so you have to check the fingerprint for all existing characters in all possible combinations (brutforce method) and compare it to the one that was given.

Example :
It starts with the md5 check of "a" and "b" [...] "aaaaaa", "aaaaab" etc ... comparing it to the given string.

How to predict the speed ?

There are 255 possible computer characters. We must divide the number of operation to be performed, by the processor frequency.

For example:
For 1 character, we will have 255 possible combinations, or 255 operations.
2 characters, it will be 255 ^ 2 = 65025 possible combinations.