Shared Community Password Recovery

Algorithms on Hashes.org

As today a lot of hashes doesn't have only standard algorithms for generating anymore, Hashes.org supports the ability to write own algorithms out of a basic set of hash algorithms. Also possible are some modifications of hashes.

This means for every hash you want to generate or you get a result of, has a string which defines how the hash is generated out of the plain. The idea of this is a little oriented to the idea MDXfind uses when cracking hashes.
Hashes.org supports this following basic hash algorithms:
MD5, SHA1, SHALINKEDIN, MD4, MD2, MYSQL5, NTLM, LM, SHA256, SHA512, SHA224, SHA384, RIPEMD128, RIPEMD160, RIPEMD256, RIPEMD320, WRL, TIGER128-3, TIGER128-4, TIGER160-3, TIGER160-4, TIGER192-3, TIGER192-4, SNEFRU0, SNEFRU256, GOST, ADLER32, CRC32A, CRC32B, SALSA10, SALSA20, HAVAL128-3, HAVAL128-4, HAVAL128-5, HAVAL160-3, HAVAL160-4, HAVAL160-5, HAVAL192-3, HAVAL192-4, HAVAL192-5, HAVAL224-3, HAVAL224-4, HAVAL224-5, HAVAL256-3, HAVAL256-4, HAVAL256-5

These hash algorithms can be combined to a algorithm string. These combinations are possible:
All the modifications and algorithms can be combined:
This example string will do the following: The plain gets hashed with the sha1(linkedin) algorithm, then rotated by 10 positions, reversed, then hashed 10 times with MD5, then the hash gets converted to uppercase, this gets hashed with SHA256 and finally the first 32hex characters get cut out.
The plain '1234' will get you the hash '82211e0bdbea01df596536e468e586c4'.
Even if the hashing string is a very flexible construct, there are some rules to stick to: