Droopy has listed a series of implementations along with the algorithms used.
This says to me that someone has implemented an algo badly and that particular implementation of the algo is flawed - not necessarily the algorithm itself (although some have been shown to have weaknesses).
I could crack the followings …
But you seem to be mentioning hashing algorithms, not encryption algorithms? Those aren't crackable in the usual sense. You can do a brute force search, but then anyone can do that. (Unless there are flaws, of course. But I don't think there are any known in SHA256 or SHA512 …) I'd go with oclHashcat, myself …
You don't take the MD5 hash of a hard disk drive, and then 'crack' it to reconstruct the hard drive contents.
I could crack the followings …
But you seem to be mentioning hashing algorithms, not encryption algorithms? Those aren't crackable in the usual sense. You can do a brute force search, but then anyone can do that. (Unless there are flaws, of course. But I don't think there are any known in SHA256 or SHA512 …) I'd go with oclHashcat, myself …
You don't take the MD5 hash of a hard disk drive, and then 'crack' it to reconstruct the hard drive contents.
Review the list "PGP", etc, those are not hash.
Try to read the information more closely