Hash Generator

Input
MD5

-

SHA-1

-

SHA-256

-

SHA-384

-

SHA-512

-

About

A hash function converts any input into a fixed-length string. The same input always produces the same hash, but even a single character change produces a completely different result. MD5 and SHA-1 are no longer recommended for security-sensitive use cases.

How to use
  1. 1.

    Type or paste the text you want to hash

  2. 2.

    All five hashes (MD5, SHA-1, SHA-256, SHA-384, SHA-512) are generated instantly

  3. 3.

    Copy the hash you need

Common uses
  • Verifying file integrity by comparing checksums

  • Generating SHA-256 hashes for use in security protocols or signing

  • Checking whether two pieces of text are identical without comparing them directly

Frequently asked questions
Which hash algorithm should I use?

For security-sensitive uses, choose SHA-256 or higher. MD5 and SHA-1 are cryptographically broken and should only be used for checksums or non-security purposes like file integrity verification.


Can I hash a file?

This tool hashes text input. For file hashing, use your operating system's built-in tools (sha256sum on Linux/macOS, Get-FileHash on Windows).


Are hashes reversible?

Hashing is a one-way function. You cannot retrieve the original text from its hash, which is what makes hashes useful for storing passwords.


Is my text sent to a server?

All hashing runs locally in your browser. SHA-1, SHA-256, SHA-384, and SHA-512 use the Web Crypto API; MD5 uses the spark-md5 library. No data is transmitted anywhere.


Why do two similar strings produce completely different hashes?

Hash functions are designed with the avalanche effect - even a single character change produces a completely different output, making tampering detectable.