🔒 All tools run entirely in your browser. No data leaves your device.

Hash Generator

Compute MD5, SHA-1, SHA-256, and SHA-512 hashes of text or files. Runs entirely in your browser via Web Crypto.

MD5
SHA-1
SHA-256
SHA-512

About this tool

Enter text (or pick a file) and get its hash in MD5, SHA-1, SHA-256, and SHA-512. All four algorithms can be computed simultaneously so you can compare their output — useful when a checksum you have in hand doesn’t match and you’re not sure which algorithm produced it.

MD5 and SHA-1 are cryptographically broken. Do not use them for signatures, password hashing, or anywhere an attacker might supply collisions. They remain useful for detecting accidental corruption of files and for identifying content where the other side uses the same algorithm.

SHA-256 and SHA-512 are the right defaults for integrity checks in modern systems. For password storage specifically, use a dedicated KDF (argon2, scrypt, bcrypt) — not a raw hash — since an unsalted fast hash is easily brute-forced.

Frequently asked questions

Is my input sent to your servers?

No. MD5 is computed by an in-page JavaScript implementation; SHA-1, SHA-256, and SHA-512 use the browser’s Web Crypto API. Nothing is transmitted.

Why is MD5 still included if it is broken?

MD5 is cryptographically broken and must not be used for security. It is still common for non-security purposes — content addressing, file integrity against accidental corruption, cache keys, legacy systems, and checksums on download pages. That’s what this tool is for.

Can I hash a file?

Yes. Use the "Hash a file…" button to pick a local file. The file is read entirely in your browser; no data is uploaded. For very large files (multi-gigabyte), expect a pause while the browser reads and hashes.

Which algorithm should I use?

For security or strong integrity: SHA-256 (good default) or SHA-512 (when file size lets you spare the bytes). For identifying duplicate content where collision resistance matters: SHA-256. For matching against legacy checksums: whatever the other system uses — often MD5 or SHA-1.

Are hash outputs case-sensitive?

Hex output is always lowercase here. When comparing against an external value, either lowercase the external value or perform a case-insensitive comparison.