Generate cryptographic hash digests from any text input using MD5, SHA-1, SHA-256, SHA-384, or SHA-512. Hashes are one-way functions — the same input always produces the same output, but you cannot reverse the hash to recover the original text. Common uses include verifying file integrity, storing passwords securely (use SHA-256 or better), and generating deterministic identifiers from structured data.
Verify a file's integrity by checking its hash against an expected checksum. Supports SHA-256, SHA-1, MD5, and more. Runs in your browser — nothing uploaded. Free.
Paste a JSON Web Token to decode and inspect its header, payload, and expiry — entirely in your browser.
Test regular expressions against a string with live match highlighting, flag toggles, and a match details table.