Crack JWT Pentesting Generate Identify Encrypt Database Contact

Hash Lookup for MD5, SHA1, SHA256, SHA512, and NTLM

This hash lookup for MD5, SHA1, SHA256, SHA512, and NTLM helps security researchers and pentesters run fast, authorized recovery workflows. CrackCrypt serves 150B lines in a precomputed DB for pentesters to perform fast searches, saving time and resources.

TRY EXAMPLE HASHES

MD5: password
SHA1: password
NTLM: password
SHA256: password
SHA512: password

Toolkit

Jump to hash lookup, crack hash tools, hash generator/identifier, JWT checker, JWT pentesting, and encryption.

Client-side privacy: JWT Pentesting signature finding + Hash Generator + Encryption run 100% in your browser except hash lookup is processed server side. No uploads.

JWT Security Checks

Use this JWT checker to decode and review JSON Web Tokens (JWTs), run pentesting checks, and test common configuration risks.

Use it as a JWT pentester online workflow to test my jwt tokens, validate signatures, check "is my jwt safe", and run authorized jwt bruteforce online checks.

JWT Token Checker

Decode claims, run validation checks, perform vulnerability testing, and verify signatures when you have the key.

Utilities

Client-side tools for hashing and identification, built to run fully in the browser.

Hash Generator

Generate common hashes in your browser. Nothing is uploaded.

Tip: Use UTF-16LE only when required. NTLM always hashes using UTF-16LE internally.

QUICK EXAMPLES

MD5: password
SHA1: test
NTLM: password
NTLM is computed as MD4(UTF-16LE(password)).
Hashes are computed locally in your browser.

Hash Identifier

Hash identification based on length, charset, and patterns.

Encryption

Encrypt/decrypt text and files locally (client-side) using modern crypto defaults.

Text Encryption

Encrypt & decrypt text locally in your browser (no uploads)

AES-GCM includes integrity protection (recommended). AES-CBC is shown for compatibility.
Format: CCRYPT1|AES-GCM|iterations|salt_b64|iv_b64|ciphertext_b64

File Encryption

Encrypt & decrypt files locally (AES-256-GCM)

Output format is a simple .ccrypt container that includes salt + IV + metadata. Keep your password safe there is no recovery.

Lookup Database

Coverage notes and performance highlights for the lookup engine.

Coverage & Performance

Our current hash database capabilities

30B lines each 150B in total
Per-Algorithm Database Size
5
Supported Algorithms
Fast Search
Search Engine
Save Time & Space
Built for Researchers

Data Sources

We build dedicated high-speed databases for MD5, SHA1, NTLM, SHA256, and SHA512 from trusted security wordlists including:

WeakPass Collections - Professional wordlists with high crack coverage.

We also use community datasets from Hashmob.

All data is used in accordance with security research best practices.

We built this service to help security researchers save time and storage by querying prepared datasets instead of rebuilding massive local hash collections. Free public access is available today, and a premium version is planned to help pentesters move faster on large engagements.

Contact & Support

Questions, feedback, or reporting an issue with the site.

For technical support, security research inquiries, or to report issues:

crack@crackcrypt.com

Please include "Security Research" in your subject line for faster response.