Hash Generator
Generate cryptographic hashes from any text input. Supports MD5, SHA-1, SHA-256, SHA-384, and SHA-512. Useful for checksums, data integrity, and development.
HMAC (with secret key)
Why use a Hash Generator?
Cryptographic hash functions are fundamental to modern security — from verifying file integrity to signing API requests. Whether you need to validate a download, generate a checksum, or create an HMAC signature, this tool covers SHA-1, SHA-256, SHA-512, and MD5 entirely in your browser. Combine it with our bcrypt generator for password hashing, or the JWT decoder to inspect signed tokens.
One-way functions
Hashes are deterministic but irreversible — the same input always produces the same output, but you cannot reverse-engineer the input.
Instant results
All hashing runs in-browser using the Web Crypto API and a pure-JS MD5 implementation — no server round-trip needed.
HMAC support
Generate keyed-hash message authentication codes (HMAC) using SHA-256 or SHA-512 for API authentication.
Hash algorithm comparison
Not all hash functions are created equal. Choose the right one for your use case. See the security tools category for more.
| Algorithm | Output length | Security | Use case |
|---|---|---|---|
| MD5 | 128-bit / 32 hex chars | Broken | Legacy checksums only — do not use for security |
| SHA-1 | 160-bit / 40 hex chars | Deprecated | Git commit IDs; avoid for new security-sensitive uses |
| SHA-256 | 256-bit / 64 hex chars | Strong | File integrity, JWT signing, TLS certificates, HMAC |
| SHA-512 | 512-bit / 128 hex chars | Very Strong | High-security applications, long-term data integrity |