Hash Generator

Generate cryptographic hash digests from any text input using MD5, SHA-1, SHA-256, SHA-384, or SHA-512. Hashes are one-way functions — the same input always produces the same output, but you cannot reverse the hash to recover the original text. Common uses include verifying file integrity, storing passwords securely (use SHA-256 or better), and generating deterministic identifiers from structured data.

All processing happens in your browser. No data is sent to any server.

Frequently Asked Questions

What is a cryptographic hash?
A hash function takes any input and produces a fixed-length output (the digest). The same input always produces the same hash, but even a tiny change to the input produces a completely different hash. Hashes are one-way — you cannot reverse the digest to recover the original input.
Which hash algorithm should I use?
For file integrity checks, SHA-256 is the modern standard. For password storage, do not use any of these algorithms directly — use a dedicated password hashing function like bcrypt, scrypt, or Argon2, which are designed to be slow and resistant to brute-force. MD5 and SHA-1 are considered cryptographically broken for security purposes.
What is MD5 still used for?
MD5 is commonly used as a non-cryptographic checksum to verify file downloads haven't been corrupted in transit — not for security. Many CDNs and download pages publish MD5 checksums alongside files for this purpose.
Is my input sent to a server?
No. All hashing is performed entirely in your browser using the Web Crypto API. Your text never leaves your device.

Related Tools