Crack JWT Pentesting Generate Identify Encrypt Database Contact

Hash Cracking Engine

We have a 29B MD5 database and 2.19B entries for NTLM and SHA-1. We are updating the NTLM and SHA-1 datasets and adding support for additional hash modes.

TRY EXAMPLE HASHES:

MD5: password
SHA1: test
NTLM: P@ssw0rd

Toolkit

Jump to hash lookup, generator, identifier, JWT pentesting and encryption

Client-side privacy: JWT Pentesting signature finding + Hash Generator + Encryption run 100% in your browser except hash lookup is processed server side. No uploads.

JWT Pentesting

Decode and review JSON Web Tokens (JWTs) locally, run pentesting checks, and flag common configuration risks.

The script also performs a client-side brute-force attack against JWTs using a list of 100,000 most commonly used JWT secrets.

JWT Pentesting

Decode claims, run validation checks, perform vulnerability testing, and verify signatures when you have the key.

Utilities

Client-side tools for hashing and identification, built to run fully in the browser.

Hash Generator

Generate common hashes in your browser. Nothing is uploaded.

Tip: Use UTF-16LE only when required. NTLM always hashes using UTF-16LE internally.

QUICK EXAMPLES:

MD5: password
SHA1: test
NTLM: password
NTLM is computed as MD4(UTF-16LE(password)).
Hashes are computed locally in your browser.

Hash Identifier

Hash identification based on length, charset, and patterns.

Encryption

Encrypt/decrypt text and files locally (client-side) using modern crypto defaults.

Text Encryption

Encrypt & decrypt text locally in your browser (no uploads)

AES-GCM includes integrity protection (recommended). AES-CBC is shown for compatibility.
Format: CCRYPT1|AES-GCM|iterations|salt_b64|iv_b64|ciphertext_b64

File Encryption

Encrypt & decrypt files locally (AES-256-GCM)

Output format is a simple .ccrypt container that includes salt + IV + metadata. Keep your password safe there is no recovery.

Database & Statistics

Coverage notes and performance highlights for the lookup engine.

Database Statistics

Our current hash database capabilities

29Billion+ For MD5 - 2B+ for NTLM,SHA1
Total Hashes
3
Supported Algorithms
~50ms
Average Lookup Time
100% Free
Always Free Service

Data Sources

We utilize wordlists from trusted security sources including:

WeakPass Collections - Professional wordlists with 90% crack rate

Also we have wordlists data from the best community Hashmob.net

All data is used in accordance with security research best practices.

For the most effective wordlists, visit WeakPass.com and hashmob.net and explore their professionally curated collections.

Contact & Support

Questions, feedback, or reporting an issue with the site.

For technical support, security research inquiries, or to report issues:

[email protected]

Please include "Security Research" in your subject line for faster response.