Identify the different types of hashes used to encrypt data and especially passwords. (Based on the work of Zion3R)
Type in the hash you want to identify in the textbox on http://cadesalaberry.github.io/hash-identifier/
The name of the most probable algorithm used to generate the hash will be displayed in the text area below.
If multiple algorithm names are displayed, they will be placed in order with the most probable at the top.