md5 to text / md5 password decrypt online

Insert your md5 hash into input area below and press the button below to see the original text with our md5decrypter...


... or use our md5 converter with REST-full API

curl -X POST "" -H "accept: application/json" -H "Content-Type: application/json" -d "{\"md5\":\"46357d5738bdf8b0b3c0229694a79163\"}"
API documentation

More md5 hash info

Thanks to the hard work of many security researchers a massive database of leaked passwords has been compiled. There are over 64 million of such passwords, and they come from some best know hacks of all times including LinkedIn and eHarmony. We built a database of hashes for all of those passwords and exposed it as super fast rest API. It can be used for your security research or as an audit of the strength of your users' passwords.

The MD5 message-digest algorithm is a prevalently used hash function producing a 128-bit hash value. Professor Ronald Rivest of MIT designed MD5 as a cryptographic hash function, but it has been found to suffer from extensive vulnerabilities.There are sevices, including our own that allow users to decrypt password online. It can still be successfully used as a checksum to verify data integrity, but only against unintentional corruption, e.g. to check whether a copy of a file is the same as the original. It remains suitable for other non-cryptographic purposes, for example for determining the partition for a particular key in a partitioned database.

One essential requirement of any cryptographic hash function is that it should be computationally infeasible to find two distinct messages which hash to the same value. MD5 fails this requirement catastrophically; an ordinary home computer can detect a collision in seconds you also can md5 decrypt online.

MD5 is one in a series of message digest algorithms designed by Professor Ronald Rivest of MIT (Rivest, 1992). When analytic work indicated that MD5's predecessor MD4 was likely to be insecure, Rivest developed MD5 in 1991 as a secure replacement. (Hans Dobbertin did indeed later find weaknesses in MD4.)