Hash Generator
Generate cryptographic hashes from text using MD5, SHA-1, SHA-256 and SHA-512. Everything runs locally in your browser.
Input Text
Hashes
| Algorithm | Hash |
|---|
About Hash Generators
A hash function converts input data into a fixed-length fingerprint. Even a small change in input creates a completely different hash. Hashes are commonly used for checksums, integrity checks, caches and signatures.
Which hash should I use?
- SHA-256 is a strong default for modern use.
- SHA-512 is suitable for high-strength checksums.
- SHA-1 and MD5 are deprecated for security but still useful for legacy checksums.
Privacy
Your input never leaves your browser.