#️⃣ Hash Generator

Compute MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes from text or files instantly. All processing happens locally — your data never leaves your browser.

MD5 · SHA-1 · SHA-256 · SHA-512 File Support No Upload
MD5
SHA-1
SHA-256
SHA-384
SHA-512

FAQ

What is a cryptographic hash?

A cryptographic hash function converts any input (text, file, etc.) into a fixed-size string called a digest. The same input always produces the same hash. Even a single character change produces a completely different hash. Hashes are one-way — you cannot recover the original data from the hash alone.

Which algorithm should I use?

For security-sensitive use cases (checksums, signing, certificates), use SHA-256 or SHA-512. SHA-1 is deprecated for security use. MD5 is broken for security but still used for non-adversarial checksums. For password hashing, use a dedicated algorithm like bcrypt or Argon2 — not a raw hash.

Is MD5 safe to use?

MD5 is cryptographically broken — collisions (two different inputs with the same hash) can be deliberately crafted. Do not use MD5 for passwords, digital signatures, or certificate fingerprints. It is still useful for simple, non-security file integrity checks.

Is my data sent to a server?

No. SHA-family hashes use the browser's built-in Web Crypto API (crypto.subtle.digest()). MD5 is computed with a pure JavaScript implementation. Nothing leaves your device.

What is SHA-256 used for?

SHA-256 is used for file integrity verification (checksums), digital signatures (code signing, TLS certificates), Bitcoin proof-of-work, and HMAC tokens. It produces a 256-bit (64 hex character) output.