Online Hash Calculator helps you calculate the cryptographic hash value of a string or file.

Multiple hashing algorithms are supported, including MD5, SHA-1, SHA-2, SHA-3 (BLAKE) also checksums like CRC32, and many other algorithms used in programming and hacking.

Hash Calculator

Online hashing for programmers & hackers

Why would you use it? Simple. Because it’s easy to use and does what it says, nothing more, nothing less.

You can hash a string, a binary file of any format, and hex bytes (e.g. 0xDEADBEEF).

Look at the example of how it calculates the hash for the medium.com string:


If you ever wanted to download videos from TikTok, you might do it the hard way by running the web page inspector within your browser and find out the HTML <video> tag, grab the video link and download it.

It can be done, sure. But it takes some practice, HTML knowledge, and most of all — time.

My little browser extension Social Media Bot (for Chrome-based browsers and Firefox) will help you to download vids from TikTok with a simple click.

  1. Install the extension (for Chrome / for Firefox)
  2. Open TikTok page
  3. Every video will have this little download icon

Unix Timestamp Converter
Unix Timestamp Converter

Convert Unix Timestamps

I would like to introduce you to my free & online Unix timestamp converter.

It’s an online time converter for epoch Unix timestamp format. I was missing some features like simple timestamp modifications or calculating the time difference in other converters so I did my own.

What is epoch time?

The Unix epoch (or Unix time or POSIX time or Unix timestamp) is the number of seconds that have elapsed since January 1, 1970 (midnight UTC/GMT), not counting leap seconds (in ISO 8601: 1970–01–01T00:00:00Z).

Literally speaking the epoch is Unix time 0 (midnight 1/1/1970), but "epoch" is often used as a synonym for Unix…


String encryption is used everywhere in desktop & mobile software. You might not even know about it, but it’s there and I’m going to show you how to do it easier and faster.

String encryption in real-world scenarios

You might ask, where is string encryption used exactly and why?

Plain text password to the database

Let me show you a list of real-world usages:

  • License system messages are encrypted to prevent finding it easily with a hex-editor, for example, “Your license key is invalid!”. If a cracker / hacker finds it, he can easily find the code that references this string and find the license check code!
  • Local database connection strings…

Note: I didn’t get paid for this article, it’s not sponsored, nor did I receive the product for free.

Programming is a hard job, especially for your back. You spend your entire life at the desk, looking at the code, sometimes even low-level assembly code, so it’s good to have a really comfortable and ergonomic office chair to support your work and your health.

Most of you probably didn’t read my old blog entry where I was struggling to find the perfect chair for a programmer. …


The set of tools for .NET reverse engineering is very different from classic tools used for the reversing of native x86 / x64 applications in PE (Windows EXE/DLL Portable Executable) or ELF (Linux Executable and Linkable Format) formats.

Different code architecture forced to create a whole range of dedicated tools for .NET executable files, I will try to present some of them that may be useful in software reversing.

Decompilers

What’s the purpose of a decompiler? .NET applications are compiled to a pseudo-code in CIL (Common Intermediate Language) format. When run, it’s interpreted, jitted, and executed by the .NET runtime library…

Bartosz Wójcik

Developer behind PELock software protection system, author of reverse engineering articles.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store