Hash Generator — MD5, SHA-1, SHA-256, SHA-512

Compute all four common cryptographic hashes of any text at once. Runs entirely in your browser — SHA via native Web Crypto, MD5 via in-page JavaScript.

Input text
MD5 128-bit
SHA-1 160-bit
SHA-256 256-bit
SHA-512 512-bit

Need to scan documents to real PDFs?

Offline PDF Scanner turns your phone camera into a real PDF scanner — with searchable text, not just photos. Works completely offline.

What is a hash function?

A cryptographic hash function takes input of any length and produces a fixed-size string — the "digest." Good hash functions are one-way (you can't reverse them), deterministic (the same input always produces the same output), and sensitive to change (flipping one bit in the input completely changes the output). They're used to verify file integrity, create content addresses, and — with the right construction — store passwords.

The four hashes this tool computes

  • MD5 (128 bits) — designed in 1991. Cryptographically broken but still used for non-security checksums and cache keys.
  • SHA-1 (160 bits) — designed in 1995. Also broken for security (SHAttered attack in 2017), still used in legacy Git commits and certificates.
  • SHA-256 (256 bits) — part of the SHA-2 family. The modern default for integrity checking, used in TLS, Bitcoin, and most file-verification workflows.
  • SHA-512 (512 bits) — SHA-2's largest variant. Slightly faster than SHA-256 on 64-bit hardware and produces a longer digest when you need more collision resistance.

How to use

  1. Type or paste text into the input panel (or upload a file).
  2. All four hashes compute live as you type.
  3. Click Copy on any row to copy that digest.
  4. Toggle uppercase if your target system expects uppercase hex.

Common use cases

  • File integrity — verify a downloaded file matches the publisher's checksum.
  • Cache keys — derive a stable identifier for a piece of content.
  • Git / content-addressable storage — Git uses SHA-1 (and now SHA-256) for commit IDs.
  • API signatures — many APIs use HMAC-SHA-256 for request signing.
  • Deduplication — detect identical files without comparing byte-by-byte.

Don't use these for passwords

Generic cryptographic hashes like SHA-256 are too fast for password storage. A modern GPU computes billions of SHA-256 digests per second, so a leaked password database can be brute-forced quickly. For passwords, use a password hash function designed to be slow and memory-hard: Argon2, bcrypt, or scrypt. Those include per-password salts and tunable work factors.

Privacy

All hashing is local. SHA variants use the browser's native crypto.subtle.digest. MD5 is implemented in JavaScript inside this page. Nothing is uploaded.

Frequently Asked Questions