sha512($salt.md5($password))
#2
Latest (as in GitHub snapshot) JtR Jumbo can do more or less any crazy algo, using a new dynamic format. It's NOT super optimized, nor does it use GPU (but it does use SIMD up to and beyond AVX2). But you can whip up all sorts of one-shot algorithms with it and it even creates its own self-test vectors on the fly.

Code:
$ ../run/john -test -form:'dynamic=sha512($salt.md5($password))'
Benchmarking: dynamic=sha512($s.md5($p)) [128/128 AVX 2x]... DONE
Many salts: 2825K c/s real, 2797K c/s virtual
Only one salt: 2694K c/s real, 2694K c/s virtual

$ ../run/john -test -form:'dynamic=sha256(md4(md5($salt).sha1($pass)))'
Benchmarking: dynamic=sha256(md4(md5($s).sha1($p))) [128/128 AVX 4x]... DONE
Many salts: 3431K c/s real, 3465K c/s virtual
Only one salt: 3262K c/s real, 3262K c/s virtual


Messages In This Thread
sha512($salt.md5($password)) - by dabofa - 07-18-2015, 03:24 PM
RE: sha512($salt.md5($password)) - by magnum - 07-18-2015, 07:54 PM
RE: sha512($salt.md5($password)) - by Rolf - 07-19-2015, 08:38 AM
RE: sha512($salt.md5($password)) - by epixoip - 07-19-2015, 10:57 AM