Hash Generator

Generate MD5, SHA-1, SHA-256 and SHA-512 hashes from text or files β€” instantly in your browser.

Ad
Verify hash:
Ad

About Hash Functions

A cryptographic hash function takes any input and produces a fixed-length string called a hash or digest. The same input always produces the same hash, but any change to the input β€” even a single character β€” produces a completely different hash. This makes hashes useful for verifying file integrity, storing passwords (in salted form), and creating checksums.

MD5 (128-bit) and SHA-1 (160-bit) are fast but considered cryptographically broken for security purposes β€” only use them for checksums and non-security use cases. SHA-256 and SHA-512 are from the SHA-2 family and remain secure. This tool uses the browser's native crypto.subtle API. Your text and files never leave your browser.


How to Use

  1. Type or paste text into the input box β€” all hashes update instantly.
  2. Click πŸ“‚ Hash a file to generate hashes from a local file.
  3. Click any hash value to copy it to your clipboard.
  4. Paste a known hash into the Verify hash field to check if it matches.
  5. Toggle UPPERCASE to switch between upper and lower case output.

Frequently Asked Questions

No β€” hash functions are one-way by design. There is no mathematical way to reverse a hash. Attackers try to "crack" hashes by running millions of candidate inputs through the same algorithm and seeing if any match (a dictionary or brute-force attack). This is why passwords should be hashed with a slow, salted algorithm like bcrypt or Argon2, not MD5 or SHA-256 alone.

Hash functions are deterministic β€” the same input always produces the same output. This property is what makes them useful for verification: if you hash a file before and after transfer and the hashes match, you know the file was not corrupted or modified. If the hashes differ, something changed. This determinism also means common words have well-known hashes, which is why passwords need a random salt added before hashing.

No. All hashing uses your browser's native crypto.subtle API. Your text and files are never sent to any server, never logged, and never stored.

Ad