"Hey guys, I've been experimenting with creating custom algorithms for cracking bases (I mean the 'cracking' in the crypto sense, not necessarily the crypto-base joke) and I wanted to share my findings. I've noticed some weird patterns when using certain hashing functions and I'm wondering if anyone else has stumbled upon similar behaviors. Has anyone ever tried to tailor-make an algo for cracking bases, or am I just lost in the weeds?"