If this tool helped you, you can buy us a coffee ☕
Convert plaintext, Hex, or Base64 strings into LM hashes. Get instant Hex and Base64 outputs with uppercase and lowercase formatting options.
Note: This tool uses MD5 to simulate LM hash for demonstration purposes. Real LM hash is based on the DES algorithm and has been deprecated due to low security.
Enter a password to start generating

NTLM Hash Calculator
Calculate the NTLM hash of any string. Supports plaintext, Hex, and Base64 inputs, outputting results in Hex and Base64 formats.

Caesar Cipher Encoder & Decoder
Easily encrypt and decrypt text using the Caesar cipher (shift cipher) with custom alphabets and shift values online.

Random Password Generator
Customize character types and length to generate strong random passwords and secure your accounts.
When verifying Windows system passwords or conducting specific security tests, the LM hash (LAN Manager Hash) is a critical password hashing format. This tool quickly calculates the LM hash value for any string, supporting plaintext, Hex, and Base64 input formats. The LM hash is a 16-byte hash value created by converting a password of up to 14 characters into two 7-byte DES keys, encrypting them, and concatenating the results. It was primarily used for early Windows network authentication. The tool outputs the hash in both Hex and Base64 encoding formats, ready for direct comparison or configuration.
Q: Are there any restrictions on the input string for LM hashes?
The LM hash algorithm is inherently designed to handle passwords up to 14 characters long. If the input exceeds this length, the tool will only process the first 14 characters. If the input is empty, it will be treated as a blank password.
Q: Does the output case option affect the hash value itself?
No. The case option only affects the visual representation of the Hex result (A-F). The underlying binary data of the hash and the Base64 encoded result remain unchanged, and its validation function is not affected.
Please ensure that the selected "Input Type" strictly matches the format of the string you provide (e.g., selecting "Plaintext" for a Base64 encoded input will result in an error). Because LM hashes have weak security (e.g., they are case-insensitive and highly vulnerable to rainbow table attacks), they are only recommended for compatibility testing, educational purposes, or analyzing specific legacy environments. Never use LM hashes for actual password storage in modern systems. This tool performs a one-way calculation and cannot reverse-engineer the original password from the hash value.
The LM hash is a crucial part of understanding the evolution of Windows authentication. During security assessments, it can be analyzed alongside the more secure NTLM hash. Typical input/output example: Entering the plaintext "PASSWORD" and selecting uppercase output will yield a fixed Hex result (e.g., E52CAC67419A9A224A3B108F3FA6CB6D), which can be used to verify the tool's accuracy or a script's expected behavior. Note that due to the inherent design of the LM hash algorithm, all inputs are converted to uppercase before calculation.