If this tool helped you, you can buy us a coffee ☕
Calculate the NTLM hash of any string. Supports plaintext, Hex, and Base64 inputs, outputting results in Hex and Base64 formats.
Enter a password to start generating

Random Password Generator
Customize character types and length to generate strong random passwords and secure your accounts.

Random Number Generator
Generate random integers or decimals within a specified range, featuring duplicate removal, sorting, and formatted output.

CRC16 Checksum Calculator
Online CRC16 checksum tool to calculate 16-bit cyclic redundancy check values for text, Hex, and Base64 data to verify data integrity.

Vigenère Cipher Encoder & Decoder
Encrypt or decrypt text using the classic polyalphabetic substitution algorithm. Ideal for cryptography learning and testing.

Random Password Generator
Customize character types and length to generate strong random passwords and secure your accounts.

Random Number Generator
Generate random integers or decimals within a specified range, featuring duplicate removal, sorting, and formatted output.

CRC16 Checksum Calculator
Online CRC16 checksum tool to calculate 16-bit cyclic redundancy check values for text, Hex, and Base64 data to verify data integrity.

Vigenère Cipher Encoder & Decoder
Encrypt or decrypt text using the classic polyalphabetic substitution algorithm. Ideal for cryptography learning and testing.

Caesar Cipher Encoder & Decoder
Easily encrypt and decrypt text using the Caesar cipher (shift cipher) with custom alphabets and shift values online.
When verifying Windows system password hashes or conducting security analysis, obtaining the NTLM hash of a string is a crucial step. This tool is designed specifically for this need, accurately converting your input string (whether in plaintext, Hex, or Base64 format) into a standard NTLM hash, presenting the results in both Hex and Base64 encoding. The NTLM hash is a password hashing algorithm used in the Microsoft Windows NT LAN Manager protocol. It maps input data of any length (typically a password) through a specific algorithm into a fixed-length (128-bit) hexadecimal string.
Q: When entering Hex or Base64, does the tool calculate the hash of the encoded string itself or the decoded content?
The tool first decodes it into raw bytes, then calculates the NTLM hash of those bytes. For example, if you input the Base64 encoded string "cGFzc3dvcmQ=" (which is Base64 for "password"), the tool will decode it to "password" before calculating its NTLM hash.
Q: Are NTLM hashes secure?
No. Due to its algorithm design (unsalted, single iteration), NTLM hashing is highly vulnerable to rainbow table attacks. It is no longer recommended for password storage in modern applications. This tool is primarily intended for compatibility testing, educational purposes, or historical data analysis.
Please ensure your input is accurate; any character difference (including spaces) will result in a completely different hash. Selecting the correct "Input Type" is crucial: if you enter a Hex string but mistakenly select "Plaintext," the tool will treat the Hex characters as regular text when calculating the hash. This tool performs all calculations purely on the frontend (client-side). It does not store or upload any of your input data; however, we still advise against entering real, active production passwords.
During Windows domain penetration testing or security auditing, NTLM hashes are key credentials required for Pass-the-Hash attacks. The hash values generated by this tool can be used directly for verification against hashes extracted from NTDS.dit or memory. Please note that an NTLM response (used for network authentication) is a different concept from a stored NTLM hash (which this tool calculates). A typical example: entering the plaintext "Password123" and selecting lowercase output yields the NTLM hash in Hex format as "e19ccf75ee54e06b06a5907af13cef42".