public marks

PUBLIC MARKS with tags hash & md5

2009

md5.rednoize.com - reverse engineer md5 hashes - powered by rednoize.com

by CharlesNepote & 5 others, 2 comments
Moteur de recherche qui permet de retrouver des mots de passe hashés en md5 ou sha1.

2007

ph33r.it

by GodSigmA
ph33r.it is free password cracking for the masses, using rainbow tables we are able to crack different types of (unsalty) hashes in seconds.

2006

MD5 Crack

by MageDealer
MD5 cracking site that uses Rainbow Tables and big dictionary search for md5 hash cracking

2005

Handy Dandy Guides - MD5 hash calculator

by Gean
Para alterar as senhas do mySQL em MD5

GData: An Online MD5 Hash Database

by vsy
太恐怖了... 你可以試著把MD5丟進去...如果可以被找出來反譯... 趕快換密碼吧!!~~

Javascript md5 (and md4 and sha1)

by nhoizey & 5 others
The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number - 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input - a small change in the input results in a substantial change in the output. The functions are thought to be secure, in the sense that it would require an enormous amount of computing power to find a string which hashes to a chosen value. In others words, there's no way to decrypt a secure hash. The uses of secure hashes include digital signatures and challenge hash authentication.

Javascript md5 (and md4 and sha1)

by Krome & 5 others
The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number - 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input - a small change in the input results in a substantial change in the output. The functions are thought to be secure, in the sense that it would require an enormous amount of computing power to find a string which hashes to a chosen value. In others words, there's no way to decrypt a secure hash. The uses of secure hashes include digital signatures and challenge hash authentication.

Javascript md4, md5 and sha1 algorithms

by benoit & 5 others
The MD4, MD5 and SHA-1 algorithms are secure hash functions. They take a string input, and produce a fixed size number - 128 bits for MD4 and MD5; 160 bits for SHA-1. This number is a hash of the input - a small change in the input results in a substantial change in the output. The functions are thought to be secure, in the sense that it would require an enormous amount of computing power to find a string which hashes to a chosen value. In others words, there's no way to decrypt a secure hash. The uses of secure hashes include digital signatures and challenge hash authentication.

PUBLIC TAGS related to tag hash

checker +   md5 +   SAH-1 +  

Active users

CharlesNepote
last mark : 14/05/2009 12:56

GodSigmA
last mark : 03/08/2007 19:39

plasticdreams
last mark : 30/10/2006 04:22

ckaroli
last mark : 03/06/2006 16:00

MageDealer
last mark : 10/11/2006 12:38

Gean
last mark : 27/09/2005 11:33

vsy
last mark : 24/08/2005 01:25

balduran
last mark : 23/08/2005 11:53

nhoizey
last mark : 03/02/2005 12:47

Krome
last mark : 03/02/2005 07:44

benoit
last mark : 03/02/2005 17:24

jey
last mark : 19/01/2005 19:44