Project 04 · Cryptography

HashCrack

Hash generator, identifier, and dictionary-attack simulator. Shows why MD5 is broken and how bcrypt changes the game.

// Hash Generator
AlgorithmHash OutputStatus
MD5Broken
SHA-1Weak
SHA-256Good
SHA-512Strong
// Hash Identifier
// Attack Configuration
// Attack Log
// Waiting for attack to start…
// Wordlist: top 80+ common passwords
// Algorithm Security Comparison
AlgorithmKey SpaceSecurityBrute-force TimeUse Today?
Caesar25 keysNone< 1msNever
MD52^128BrokenSeconds (GPU)Never
SHA-12^160WeakHours (cluster)Legacy only
SHA-2562^256Good~10^18 yearsYes
SHA-5122^512Strong~10^58 yearsYes
bcryptWork factorBestAdjustableYes — for passwords
Argon2ConfigurableBestMemory-hardYes — winner of PHC
💡 For password storage, always use a purpose-built password hashing function (bcrypt, Argon2, scrypt) — never raw SHA-256. They are deliberately slow and resistant to GPU attacks.