Cracking password hashes on your own without the proper hardware can become time-consuming and tedious. Luckily for those capped by their hardware a variety of free sites have arisen over the years.
https://crackstation.net/ – They support hashes such as LM, NTLM, md2, md4, md5, md5(md5_hex), md5-half, sha1, sha224, sha256, sha384, sha512, ripeMD160, whirlpool, MySQL 4.1+ (sha1(sha1_bin)), QubesV3.1BackupDefaults. They also boast a 190GB, 15-billion-entry lookup table as well as providing their main 1.4 billion 15gb wordlist free for download.
https://hashkiller.io/ – This site provides a crowdsourcing approach. Users can submit hash lists for others on the site that decrypt to gain rank in the leaderboard. They support various combinations of MD5 + salt along with sha1, sha224, sha256, sha384, sha512, whirlpool, MySQL 3, MySQL 5, ntlm, DES
https://hashes.com/en/decrypt/hash – They offer a free service that will compare hashes with what they have in plain text. If it isn’t found they provide an option to connect you to those who will crack the hashes at a fee. They support MD5, SHA1, MySQL, NTLM, SHA256, SHA512.
https://md5decrypt.net/en/ – This site offers the basic decryption of MD4, MD5, Sha1, Sha256, Sha384, Sha512, Ntlm, Xor, Bcrypt, Blowfish, and Whirlpool hashes. Their database contains 15 billion word combinations and allows up to 500 hash submissions at a time.
http://rainbowtables.it64.com/ – This site offers a rainbow table attack on Microsoft Windows LM hashes. If the hash has been cracked before and is in the database it will present the decrypted hash. If it hasn’t they claim 3 minutes to a few hours, with the average time being 7 hours, depending on the number of hashes submitted.
More additions will be added as competent sites are found.