Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from any text or file. Useful for verifying file integrity, checksums, and checking passwords. All processing is local — nothing is uploaded.
Web Crypto API · Runs in your browserOr drop a file here to hash its contents
No. Hash functions are one-way — it's computationally infeasible to reverse them. You can only verify a hash by hashing the same input and comparing outputs.
MD5 is broken for cryptographic security — collisions (different inputs producing the same hash) can be generated. It's still fine for non-security uses like checksums to detect accidental file corruption.
They shouldn't, if the encoding is the same. Hash functions are deterministic — identical inputs always produce identical outputs. Differences are usually caused by character encoding (UTF-8 vs. UTF-16) or whitespace differences.
Yes. All hashing runs in your browser using the Web Crypto API. Nothing is transmitted to any server. You can verify this by going offline and using the tool — it still works.