0 Members and 10 Guests are viewing this topic.
Brutal!! That not only returns what has been hashed but also witch function was used? That must take a few minutes, or hours to run if the hash is not in a dictionary or a database.
I believe it only identifies what sort of hash/algorithm it MIGHT be. There is no way telling if a MD5(example) hash has been made by md5() or md5(md5()) etc. I guess it checks for length and prefixes often used by some hashes/algorithms.
http://code.google.com/p/hash-identifier/source/browse/trunk/Hash_ID_v1.1/Hash_ID.py
The source code for the lazies: http://code.google.com/p/hash-identifier/source/browse/trunk/Hash_ID_v1.1/Hash_ID.py
15:04 @Phage : I'm bored of Python
that code made me sad.
Just brushing though. I will be semi active mainly came to find a HQ botnet, like THOR or just any p2p botnet
It is aesthetically horrible, but since it uses basic constructs, it's probably more efficient, too.Real programmers can write FORTRAN in any language. That's the old proverb.