0/25
Our hash testing service utilizes Hashcat, chosen for its exceptional speed and efficiency. As a result, it supports all hash types compatible with Hashcat. If you do not specify a hash type, the service will attempt to automatically detect it.
However, since we do not know how your hash was generated, automatic detection may lead to errors.
| Name | Description | ~Passwords (M) |
|---|---|---|
| weakpass_4.txt | Huge mixed list from public breaches | 2,200 |
| Hashes.org | Community-contributed cracked hashes | 1,400 |
| hashkiller24.txt | Hashkiller dump, common password matches | 280 |
| cyclone_hk.txt | HashKiller subset, cleaned and sorted | 250 |
| hashmob.net.user.found.txt | Verified found passwords from HashMob | 68 |
| hk_hlm_founds.txt | HashKiller high-quality found hashes | 37 |
| kaonashi14M.txt | High-quality passwords collected from leaks | 12 |
| ignis-10M.txt | Curated popular 10M passwords | 9 |
| piotrcki-wordlist-top10m.txt | Common password list by popularity | 8 |
Total coverage: Over 4.2 billion unique passwords checked using more than 40 GB of curated wordlists.
| Component | Details |
|---|---|
| GPU | 4× RTX 3060, 12 GB VRAM, 24.1 TFLOPS |
| CPU | Intel Xeon E5-2673 v4, 16 cores |
| RAM | 52 GB |
| Storage | 490.6 GB NVMe, 1773 MB/s |
| Network | 54 Mbps upload / 647 Mbps download |
| CUDA Compute | Max 12.8 |
| Performance | 24.7 DLPerf |
HSH.lol is online tool to check how strong your hash really is. It's built for security folks, pentesters, and sysadmins.
We don't brute-force hashes. Instead, we match them against huge public wordlists and leaks.
Goal: Show how easily your password can break. Not to break it — to warn you.