Hashes by HashDB.org is a hash lookup service. This allows you to input an MD4, MD5, RIPEMD160, SHA-1, SHA-256, SHA-384, SHA-512, WHIRLPOOL, MYSQL etc hash and search for its corresponding plaintext (“found”) in our database of already-cracked hashes.

MD4 (Message Digest Algorithm 4)

is a cryptographic hash function that produces a 128-bit hash value, typically rendered as a 32-character hexadecimal number. Developed by Ronald Rivest in 1990, MD4 was designed to be fast and straightforward, making it suitable for applications where efficiency is crucial.

MD5 (Message Digest Algorithm 5)

is a widely used cryptographic hash function that generates a 128-bit hash value, typically represented as a 32-character hexadecimal number. Developed by Ronald Rivest in 1991, MD5 is designed to be fast and efficient, making it suitable for a variety of applications such as digital signatures, password hashing, and checksums for data integrity verification.

RIPEMD-160 (RACE Integrity Primitives Evaluation Message Digest 160)

is a cryptographic hash function designed for producing a fixed-size 160-bit (20-byte) hash value from variable-length input data. Developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel in 1996. RIPEMD-160 was originally intended as part of the European Union’s RACE Integrity Primitives Evaluation (RIPE) project.

SHA-1 (Secure Hash Algorithm 1)

is a cryptographic hash function that produces a fixed-size 160-bit (20-byte) hash value from variable-length input data. Developed by the National Security Agency (NSA). Published by the National Institute of Standards and Technology (NIST) in 1993. SHA-1 was designed to provide data integrity and authenticity verification in digital signatures, message authentication codes, and other cryptographic applications.

SHA-256 (Secure Hash Algorithm 256-bit)

is a cryptographic hash function that produces a fixed-size 256-bit (32-byte) hash value from variable-length input data. It is part of the SHA-2 (Secure Hash Algorithm 2) family of hash functions designed by the National Security Agency (NSA). Published by the National Institute of Standards and Technology (NIST) in 2001.

SHA-384 (Secure Hash Algorithm 384-bit)

is a cryptographic hash function that generates a fixed-size 384-bit (48-byte) hash value from variable-length input data. SHA-2 (Secure Hash Algorithm 2) is part of hash functions developed by the National Security Agency (NSA). Published by the National Institute of Standards and Technology (NIST) in 2001.

SHA-512 (Secure Hash Algorithm 512-bit)

is a cryptographic hash function that generates a fixed-size 512-bit (64-byte) hash value from variable-length input data. It belongs to the SHA-2 (Secure Hash Algorithm 2) family of hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST) in 2001.

Whirlpool

is a cryptographic hash function designed by Vincent Rijmen and Paulo S. L. M. Barreto. It’s intended to produce secure hash values for use in digital signatures, message authentication codes, and data integrity verification. It was first published in 2000.

MySQL

One common hashing function used in MySQL is SHA2(). This function allows users to generate SHA-2 (Secure Hash Algorithm 2) cryptographic hashes for data stored in the database. MySQL also provides other cryptographic functions like MD5(), SHA1(), PASSWORD(), etc., but these are generally considered less secure than SHA-2 hashes.