Hash Generator
Generate SHA-256, SHA-1, SHA-512, or MD5 hashes from any text. Hashes recompute as you type. Web Crypto API in the browser, no upload, no signup.
settingsAlgorithm
infoHash Lengths
lightbulbTip
Hash functions are one-way -- you cannot reverse a hash back to the original input. For security-sensitive use cases like password storage, always use SHA-256 or SHA-512.
What is the Hash Generator?
A cryptographic hash function turns any input, of any length, into a fixed-size string of hex characters. The same input always produces the same output, but flipping a single bit produces a wildly different result. Hashes are how systems verify file integrity, fingerprint data, and (with the right algorithms) store passwords without keeping the password itself.
How to use the Hash Generator
- 1
Pick an algorithm
Choose SHA-256 for general-purpose work, SHA-512 for higher security margins, SHA-1 or MD5 only for legacy checksums.
- 2
Type or paste your input
The hash recomputes about 80 ms after you stop typing, so there's no submit button.
- 3
Copy the hex output
SHA-256 outputs 64 characters, SHA-1 outputs 40, SHA-512 outputs 128, MD5 outputs 32. Tap the copy icon to send the result to your clipboard.
- 4
Verify against a known value
Paste your hash next to the one you're checking. If a single character differs, the inputs differ. Hashes don't have near-misses.
Frequently Asked Questions
What hash algorithms are supported?
Four: SHA-256 (default), SHA-512, SHA-1, and MD5. SHA-256 fits almost every general-purpose use, SHA-512 buys extra collision margin for high-security work, SHA-1 and MD5 stay around for legacy compatibility.
Is MD5 still safe to use?
Not for anything cryptographic. Practical collisions for MD5 have been published since 2004, so two different inputs can be made to produce the same hash. It's still fine for non-adversarial checksums (download integrity, cache keys), but use SHA-256 anywhere a malicious party could choose the input.
How is the hash generated?
SHA-256, SHA-1, and SHA-512 all run through crypto.subtle.digest(), the browser's native Web Crypto API. MD5 uses a client-side implementation since browsers don't ship MD5 in Web Crypto. Either way, the input never leaves the page.