Hash Generator
Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from text
Enter text or select a file above to generate hashes
How to Use
Frequently Asked Questions
What is a hash function?
A hash function takes input data of any size and produces a fixed-size output (hash/digest). The same input always produces the same hash, but you cannot reverse a hash back to the original data.
Which hash algorithm should I use?
SHA-256 is recommended for most use cases. SHA-1 is considered weak for security. SHA-512 provides higher security but longer output. MD5 is broken for security but still used for checksums.
Is my data safe?
Yes, all hashing happens in your browser using the Web Crypto API. No data is sent to any server.
What is HMAC?
HMAC (Hash-based Message Authentication Code) combines a cryptographic hash function with a secret key to provide both data integrity and authentication. It is commonly used in API authentication and JWT signatures.
Can I hash files?
Yes, you can drag-and-drop a file or use the file picker. The file is read locally in your browser and hashed using the Web Crypto API without uploading anything.