Hash Generator
MD5, SHA-256, SHA-512
————What is Hash Generator?
Compute SHA-1, SHA-256, SHA-384, and SHA-512 hashes of any text or file, in hex or Base64 output. Uses the browser's Web Crypto API so hashing runs at native speed, even on large files. All four algorithms are computed in parallel so you can compare or pick whichever fits your integration. MD5 is intentionally omitted — it's deprecated for anything security-adjacent.
How do I use Hash Generator?
- Paste text or drop a file.
- Choose output encoding: hex or Base64.
- All four digests appear together; copy whichever you need.
Hash Generator by the numbers
- Algorithms
- MD5, SHA-1, SHA-256, SHA-384, SHA-512
- Engine
- SubtleCrypto (Web Crypto)
- Input types
- Text, file
- Max file
- Streaming — unbounded
- Encodings
- Hex, base64
Common use cases for Hash Generator
- Verifying a downloaded ISO against its published SHA-256.
- Producing a deterministic filename from content.
- Deduplicating files by hash in an archive workflow.
- Generating cache keys for a build pipeline.
- Sanity-checking that two files are byte-identical.
Common pitfalls and how to avoid them
- SHA-1 matches but MD5 does not (or vice versa) — Different algorithms produce different digests — not a collision. Use the algorithm the publisher specifies.
- Whitespace changes the hash — Hashes are content-sensitive. A trailing newline, a \r vs \n difference, or a BOM will change the result.
- Using these for passwords — Do not. Use bcrypt / argon2 / scrypt for password storage — plain hashes are too fast and vulnerable to GPU attacks.
When should I use Hash Generator?
Hash Generator is for checksums, fingerprints, and non-reversible identifiers. For a keyed signature (HMAC), use HMAC Generator. For password storage hashing specifically, neither tool is right — server-side, use bcrypt/argon2.
Which hash algorithms are supported?
MD5, SHA-1, SHA-256, SHA-384, SHA-512. SHA-256 is the default and recommended; MD5 and SHA-1 are kept for legacy compatibility only.
Can I hash files, not just text?
Yes. Drop a file onto the upload zone and the tool streams it through the hash — useful for verifying downloads against a published checksum.
Are these hashes suitable for password storage?
No. Plain hashes are too fast for password storage. Use a purpose-built algorithm like bcrypt, argon2, or scrypt with a salt — this tool is for file checksums and non-secret data.
Is my file uploaded anywhere?
No. Everything runs in your browser. Your files never leave your device, and there is no server component for this tool.