Tiny Online Tools logoTiny Online Toolssearch搜索工具…grid_view全部工具
首页chevron_right安全工具chevron_rightBcrypt 生成器Bcrypt 生成器

Bcrypt 生成器

生成 bcrypt 密码哈希值。

Fast (~100ms) — suitable for most apps

验证密码

相似工具

密码生成器

密码生成器

生成安全的随机密码。

MD5 生成器

MD5 生成器

快速生成 MD5 哈希值。

口令短语生成器

口令短语生成器

生成安全且易于记忆的口令短语。

SHA-256 生成器

SHA-256 生成器

从文本生成 SHA-256 哈希。

网站图标生成器

网站图标生成器

从任意图片生成所有 favicon 尺寸,并附带可直接使用的 HTML link 标签代码。

重新排序 PDF 页面

重新排序 PDF 页面

重新排列 PDF 文档中的页面顺序。

调整图片大小

调整图片大小

将图片调整为自定义尺寸,同时保持质量。

apps

更多工具

浏览我们完整的免费在线工具集合。

Bcrypt Generator

Bcrypt is the gold standard for password hashing in modern applications. Unlike simple cryptographic hashes like MD5 or SHA-1, bcrypt is intentionally computationally expensive—it gets slower as computers get faster—making it extraordinarily resistant to brute-force password guessing. This tool lets you 生成 bcrypt hashes and verify passwords against them, all without transmitting your passwords over the network.

Why bcrypt beats simple hashing

If you simply hash a password with SHA-256 and store the hash, an attacker with that hash can try billions of password guesses per second using modern GPUs. Bcrypt solves this by incorporating a configurable "cost factor" (salt rounds) that makes each hash computation take significant time. Even with a cost factor of 10, each hash takes about 100 milliseconds—meaning an attacker could only try 10 passwords per second instead of billions.

Salt rounds matter

This tool lets you choose between 10 and 13 salt rounds. Cost 10 is suitable for most web applications and completes in roughly 100ms per hash. Cost 12 or 13 is recommended for high-security applications like financial systems, though hashing will take longer (seconds instead of milliseconds). As computers get faster, you can increase the cost factor to keep hashing slow.

Hashing and verification

Enter any password and the tool 生成s a bcrypt hash. Unlike reversible 加密ion, bcrypt hashing is one-way—you cannot decrypt the hash back to the original password. To verify a password, bcrypt takes the original password, applies the same algorithm, and compares the result against the stored hash. This tool includes a verification section where you can test whether a password matches a bcrypt hash.

Safe to share hashes

Bcrypt hashes are safe to store in databases and safe to share publicly. Even if an attacker has the hash, finding the original password through brute force would take centuries.