Cybersecurity Utilities
Paste a hash and identify its algorithm — useful in CTF challenges and penetration testing
32 hex
40 hex
64 hex
128 hex
$2a/b/y$ prefix
$6$ prefix
$1$ prefix
16 hex
41 chars (*)
44 chars