Hash Generator

Instantly compute MD5, SHA-1, SHA-256, and SHA-512 hashes in your browser. Nothing is uploaded.

⚠ Security notice: MD5 and SHA-1 are cryptographically broken — use SHA-256 or SHA-512 for any security-sensitive purpose (password storage, signatures, integrity against an adversary).
MD5
SHA-1
SHA-256
SHA-512

Frequently Asked Questions

What is a cryptographic hash?

A cryptographic hash is a fixed-length fingerprint of some input. The same input always produces the same hash, but even a one-character change produces a completely different hash.

Which hash algorithm should I use?

Use SHA-256 or SHA-512 for anything security-related. MD5 and SHA-1 are broken and should only be used for non-adversarial checksums.

Is this hash generator private?

Yes. SHA variants use the browser's built-in Web Crypto API, and MD5 is computed in JavaScript locally. Nothing is uploaded.

Why is MD5 considered broken?

MD5 is vulnerable to practical collision attacks — two different inputs can produce the same hash. Never use it for signatures, password hashing, or integrity against an attacker.

Can I hash a file?

This tool hashes text. For files, use a dedicated tool or a command like sha256sum file.bin on your terminal.

Related Tools You Might Like

Password Strength Checker Check entropy, patterns, and crack time. UUID Generator Cryptographically secure UUID v4 generation. JWT Decoder Inspect JSON Web Tokens safely in your browser.