Hash Generator

Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from any text or file. Useful for verifying file integrity, checksums, and checking passwords. All processing is local — nothing is uploaded.

Web Crypto API · Runs in your browser

Or drop a file here to hash its contents

Hash algorithm comparison

  • MD5 — 128-bit, fast. Not collision-resistant. Use only for checksums, not security.
  • SHA-1 — 160-bit. Deprecated for security. Still used for Git commits and legacy systems.
  • SHA-256 — 256-bit. Current standard. Used in TLS, code signing, and Bitcoin.
  • SHA-512 — 512-bit. Maximum security. Preferred for password storage contexts.

Common uses

  • Verify a downloaded file matches its published checksum
  • Compare two files are identical without opening them
  • Check if a password matches a stored hash
  • Generate deterministic identifiers from content
  • Detect whether data has been tampered with

Frequently Asked Questions

Can I reverse a hash back to the original text?

No. Hash functions are one-way — it's computationally infeasible to reverse them. You can only verify a hash by hashing the same input and comparing outputs.

Is MD5 safe to use?

MD5 is broken for cryptographic security — collisions (different inputs producing the same hash) can be generated. It's still fine for non-security uses like checksums to detect accidental file corruption.

Why do the same words produce different hashes on different sites?

They shouldn't, if the encoding is the same. Hash functions are deterministic — identical inputs always produce identical outputs. Differences are usually caused by character encoding (UTF-8 vs. UTF-16) or whitespace differences.

Is it safe to paste sensitive text here?

Yes. All hashing runs in your browser using the Web Crypto API. Nothing is transmitted to any server. You can verify this by going offline and using the tool — it still works.