Hash Generator

Generate cryptographic hashes from any text input. Supports MD5, SHA-1, SHA-256, SHA-384, and SHA-512. Useful for checksums, data integrity, and development.

Runs in browser — no data sent to servers hash sha256 md5 checksum
MD5
SHA-1
SHA-256
SHA-384
SHA-512

HMAC (with secret key)

Why use a Hash Generator?

Cryptographic hash functions are fundamental to modern security — from verifying file integrity to signing API requests. Whether you need to validate a download, generate a checksum, or create an HMAC signature, this tool covers SHA-1, SHA-256, SHA-512, and MD5 entirely in your browser. Combine it with our bcrypt generator for password hashing, or the JWT decoder to inspect signed tokens.

🔐

One-way functions

Hashes are deterministic but irreversible — the same input always produces the same output, but you cannot reverse-engineer the input.

Instant results

All hashing runs in-browser using the Web Crypto API and a pure-JS MD5 implementation — no server round-trip needed.

🔑

HMAC support

Generate keyed-hash message authentication codes (HMAC) using SHA-256 or SHA-512 for API authentication.

Hash algorithm comparison

Not all hash functions are created equal. Choose the right one for your use case. See the security tools category for more.

Algorithm Output length Security Use case
MD5 128-bit / 32 hex chars Broken Legacy checksums only — do not use for security
SHA-1 160-bit / 40 hex chars Deprecated Git commit IDs; avoid for new security-sensitive uses
SHA-256 256-bit / 64 hex chars Strong File integrity, JWT signing, TLS certificates, HMAC
SHA-512 512-bit / 128 hex chars Very Strong High-security applications, long-term data integrity