Hash Generator

Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from text

Encoders & Decoders Runs in your browser

Enter text or select a file above to generate hashes

How to Use

1Enter or paste text, or switch to file mode to hash a file
2Select an algorithm using the pill tabs (SHA-1, SHA-256, SHA-512)
3Enable HMAC mode and enter a secret key for keyed hashing
4Use Compare mode to verify a hash against a known value
5Click the copy button next to any hash to copy it

Frequently Asked Questions

What is a hash function?

A hash function takes input data of any size and produces a fixed-size output (hash/digest). The same input always produces the same hash, but you cannot reverse a hash back to the original data.

Which hash algorithm should I use?

SHA-256 is recommended for most use cases. SHA-1 is considered weak for security. SHA-512 provides higher security but longer output. MD5 is broken for security but still used for checksums.

Is my data safe?

Yes, all hashing happens in your browser using the Web Crypto API. No data is sent to any server.

What is HMAC?

HMAC (Hash-based Message Authentication Code) combines a cryptographic hash function with a secret key to provide both data integrity and authentication. It is commonly used in API authentication and JWT signatures.

Can I hash files?

Yes, you can drag-and-drop a file or use the file picker. The file is read locally in your browser and hashed using the Web Crypto API without uploading anything.

Related Tools