you can get your API key in your account and try this script in Java:<\/strong><\/p>\n\n\n\n import java.security.*;\n import java.math.*;\n import java.net.*;\n import java.io.*;\n \n public class tests { \n \n public static String MD5(String s) throws Exception {\n \n MessageDigest m=MessageDigest.getInstance(\"MD5\");\n m.update(s.getBytes(),0,s.length());\n return new BigInteger(1,m.digest()).toString(16);\n \n }\n \n public static String Decrypt(String md5_hash) throws Exception {\n \n String api_key = \"YOUR_VIP_KEY\";\n URL md5online = new URL(\"https:\/\/www.md5online.org\/api.php?d=1&p=\"+api_key+\"&h=\"+md5_hash);\n BufferedReader in = new BufferedReader(new InputStreamReader(md5online.openStream()));\n \n String result = \"\";\n String inputLine;\n while ((inputLine = in.readLine()) != null)\n result = result+inputLine;\n in.close();\n \n return result;\n }\n \n public static void main(String args[]) throws Exception {\n \n \/\/Encode\n String md5 = MD5(\"MD5Online\");\n System.out.println(\"MD5 hash: \"+md5);\n \n \/\/Decode\n String word = Decrypt(md5);\n System.out.println(\"API Result: \"+word);\n \n }\n } <\/pre>\n\n\n\nThe \u201c&d=1\u201d parameter in the URL is here to display any error message.
Also, feel free to contact me if you don\u2019t know how to fix it.<\/p>\n\n\n\n
Anyway, this code is working fine on my side:
<\/p>\n\n\n\n
<\/span>Conclusion<\/span><\/h2>\n\n\n\nThat\u2019s it, you now know how to decrypt MD5 passwords in Java, with the two solutions depending on your situation:<\/p>\n\n\n\n
- If the goal is to verify the password, you don\u2019t need to decrypt them at all (and you know how to do this)<\/li>
- If your main purpose is try to hack passwords and find the corresponding word, you can use our API at MD5Online.<\/li><\/ul>\n\n\n\n
If this tutorial was useful for you, please share it on your favorite social network!<\/p>\n","protected":false},"excerpt":{"rendered":"
Everybody wants a solution to decrypt MD5 hashs, and Java programmers are also interested \ud83d\ude42In this article, you’ll learn how to do this, and also discover a few things about the MD5 algorithm. The MD5 cryptographic algorithm only works one way. It’s possible to crypt a word into MD5 with Java, but there is no…<\/p>\n","protected":false},"author":1,"featured_media":394,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[15],"tags":[],"taxonomy_info":{"category":[{"value":15,"label":"Hacking"}]},"featured_image_src_large":["https:\/\/infosecscout.com\/wp-content\/uploads\/2021\/05\/decrypt-md5-hash-java-1024x683.jpg",1024,683,true],"author_info":{"display_name":"Patrick Fromaget","author_link":"https:\/\/infosecscout.com\/about\/"},"comment_info":0,"category_info":[{"term_id":15,"name":"Hacking","slug":"hacking","term_group":0,"term_taxonomy_id":15,"taxonomy":"category","description":"Ready to level up? Our Hacking Guides have you covered with step-by-step instructions on using tools like Hashcat. It's hacking made simple and fun!","parent":0,"count":15,"filter":"raw","cat_ID":15,"category_count":15,"category_description":"Ready to level up? Our Hacking Guides have you covered with step-by-step instructions on using tools like Hashcat. It's hacking made simple and fun!","cat_name":"Hacking","category_nicename":"hacking","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/posts\/380"}],"collection":[{"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/comments?post=380"}],"version-history":[{"count":15,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/posts\/380\/revisions"}],"predecessor-version":[{"id":464,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/posts\/380\/revisions\/464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/media\/394"}],"wp:attachment":[{"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/media?parent=380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/categories?post=380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosecscout.com\/wp-json\/wp\/v2\/tags?post=380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}