Password Attackshashidentificationpasswordcrackinghashcatjohntheripper

hashid

hashID identifies over 175 unique hash types using regular expressions. It analyzes single hashes or parses files to detect hash types, including salted passwords.

Description

hashID is a Python 3.x tool designed to identify different types of hashes used to encrypt data, particularly passwords. It supports the identification of over 175 unique hash types through regular expressions, making it valuable for password cracking workflows.

Use cases include analyzing unknown hashes from captures or files to determine their type before applying cracking tools like Hashcat or John the Ripper. The tool can process a single hash input or scan entire files for multiple hashes.

A nodejs version is available for online hash identification, providing flexibility in deployment. It integrates well with penetration testing methodologies, such as those in PEN-200 training for password attacks.

How It Works

hashID employs regular expressions to match input strings against patterns for over 175 known hash algorithms. It processes either a single hash provided as input or scans files to identify multiple hashes within them. Optional modes display corresponding Hashcat modes or John the Ripper formats, and extended mode includes salted password variants.

Installation

bash
sudo apt install hashid

Flags

-e, --extendedlist all possible hash algorithms including salted passwords
-m, --modeshow corresponding Hashcat mode in output
-j, --johnshow corresponding JohnTheRipper format in output
-o, --outfile FILEwrite output to file
-h, --helpshow this help message and exit
--versionshow program's version number and exit

Examples

Display the help message and usage information for hashid
hashid -h
Identify the type of a single MD5 hash provided as input
hashid '5f4dcc3b5aa765d61d8327deb882cf99'
Identify a hash with extended mode to include salted password algorithms
hashid -e '5f4dcc3b5aa765d61d8327deb882cf99'
Identify a hash and show the corresponding Hashcat mode
hashid -m '5f4dcc3b5aa765d61d8327deb882cf99'
Identify a hash and show the corresponding John the Ripper format
hashid -j '5f4dcc3b5aa765d61d8327deb882cf99'
Parse a file containing hashes and write the identification results to output.txt
hashid -o output.txt hashes.txt
Read hashes from STDIN (piped input) and identify their types
cat hashes.txt | hashid
Updated 2026-04-16kali.org ↗