Get started
HomeEncoding & SecurityHash Generator
Encoding & SecurityRuns in your browser · files never uploaded

Hash Generator

MD5, SHA-256, SHA-512

4.8· 88 votes
A hash generator produces a fixed-length digest of its input using a hash function like SHA-256 or MD5. StuHub hashes text and files entirely in your browser via the SubtleCrypto API — useful for verifying downloads, producing stable IDs, and generating non-secret fingerprints.
Your file never leaves this browser. Everything runs on your device — no uploads, no server storage, no retention.How it works →
Input text43 chars
Digests
SHA-1
SHA-256
SHA-384
SHA-512
Uses the browser's Web Crypto API. MD5 is intentionally omitted — it's deprecated for anything security-adjacent; if you need it for checksums, use SHA-1 or SHA-256.

What is Hash Generator?

Compute SHA-1, SHA-256, SHA-384, and SHA-512 hashes of any text or file, in hex or Base64 output. Uses the browser's Web Crypto API so hashing runs at native speed, even on large files. All four algorithms are computed in parallel so you can compare or pick whichever fits your integration. MD5 is intentionally omitted — it's deprecated for anything security-adjacent.

How do I use Hash Generator?

  1. Paste text or drop a file.
  2. Choose output encoding: hex or Base64.
  3. All four digests appear together; copy whichever you need.

Hash Generator by the numbers

Algorithms
MD5, SHA-1, SHA-256, SHA-384, SHA-512
Engine
SubtleCrypto (Web Crypto)
Input types
Text, file
Max file
Streaming — unbounded
Encodings
Hex, base64

Common use cases for Hash Generator

  • Verifying a downloaded ISO against its published SHA-256.
  • Producing a deterministic filename from content.
  • Deduplicating files by hash in an archive workflow.
  • Generating cache keys for a build pipeline.
  • Sanity-checking that two files are byte-identical.

Common pitfalls and how to avoid them

  • SHA-1 matches but MD5 does not (or vice versa)Different algorithms produce different digests — not a collision. Use the algorithm the publisher specifies.
  • Whitespace changes the hashHashes are content-sensitive. A trailing newline, a \r vs \n difference, or a BOM will change the result.
  • Using these for passwordsDo not. Use bcrypt / argon2 / scrypt for password storage — plain hashes are too fast and vulnerable to GPU attacks.

When should I use Hash Generator?

Hash Generator is for checksums, fingerprints, and non-reversible identifiers. For a keyed signature (HMAC), use HMAC Generator. For password storage hashing specifically, neither tool is right — server-side, use bcrypt/argon2.

Frequently asked
Which hash algorithms are supported?

MD5, SHA-1, SHA-256, SHA-384, SHA-512. SHA-256 is the default and recommended; MD5 and SHA-1 are kept for legacy compatibility only.

Can I hash files, not just text?

Yes. Drop a file onto the upload zone and the tool streams it through the hash — useful for verifying downloads against a published checksum.

Are these hashes suitable for password storage?

No. Plain hashes are too fast for password storage. Use a purpose-built algorithm like bcrypt, argon2, or scrypt with a salt — this tool is for file checksums and non-secret data.

Is my file uploaded anywhere?

No. Everything runs in your browser. Your files never leave your device, and there is no server component for this tool.

Related in Encoding & Security
Base64 Encode
Base64 Decode
URL Encode
URL Decode
JWT Decoder
Password Generator
Strength Checker
HMAC Generator