Online Hash Calculator helps you calculate the cryptographic hash value of a string or file.
Multiple hashing algorithms are supported, including MD5, SHA-1, SHA-2, SHA-3 (BLAKE) also checksums like CRC32, and many other algorithms used in programming and hacking.
Why would you use it? Simple. Because it’s easy to use and does what it says, nothing more, nothing less.
You can hash a string, a binary file of any format, and hex bytes (e.g.
Look at the example of how it calculates the hash for the medium.com string:
If you ever wanted to download videos from TikTok, you might do it the hard way by running the web page inspector within your browser and find out the HTML <video> tag, grab the video link and download it.
It can be done, sure. But it takes some practice, HTML knowledge, and most of all — time.
My little browser extension Social Media Bot (for Chrome-based browsers and Firefox) will help you to download vids from TikTok with a simple click.
I would like to introduce you to my free & online Unix timestamp converter.
It’s an online time converter for epoch Unix timestamp format. I was missing some features like simple timestamp modifications or calculating the time difference in other converters so I did my own.
The Unix epoch (or Unix time or POSIX time or Unix timestamp) is the number of seconds that have elapsed since January 1, 1970 (midnight UTC/GMT), not counting leap seconds (in ISO 8601: 1970–01–01T00:00:00Z).
Literally speaking the epoch is Unix time
0 (midnight 1/1/1970), but "epoch" is often used as a synonym for Unix…
String encryption is used everywhere in desktop & mobile software. You might not even know about it, but it’s there and I’m going to show you how to do it easier and faster.
You might ask, where is string encryption used exactly and why?
Let me show you a list of real-world usages:
Note: I didn’t get paid for this article, it’s not sponsored, nor did I receive the product for free.
Programming is a hard job, especially for your back. You spend your entire life at the desk, looking at the code, sometimes even low-level assembly code, so it’s good to have a really comfortable and ergonomic office chair to support your work and your health.
Most of you probably didn’t read my old blog entry where I was struggling to find the perfect chair for a programmer. …
The set of tools for .NET reverse engineering is very different from classic tools used for the reversing of native x86 / x64 applications in PE (Windows EXE/DLL Portable Executable) or ELF (Linux Executable and Linkable Format) formats.
Different code architecture forced to create a whole range of dedicated tools for .NET executable files, I will try to present some of them that may be useful in software reversing.
What’s the purpose of a decompiler? .NET applications are compiled to a pseudo-code in CIL (Common Intermediate Language) format. When run, it’s interpreted, jitted, and executed by the .NET runtime library…
Developer behind PELock software protection system, author of reverse engineering articles.