Hash Generator
Generate MD5, SHA-1, SHA-256 hashes from text.
Note: Hashes are generated client-side. MD5 uses a bundled implementation; SHA uses the Web Crypto API.
Use SHA-256 or SHA-512 for anything security-sensitive. MD5 and SHA-1 are kept for legacy compatibility only.
About this tool
Generate cryptographic hashes from text input using various algorithms including MD5, SHA-1, SHA-256, and SHA-512. Useful for verifying data integrity and security applications.
Variants
MD5 Hash
Generate MD5 hashes from text in your browser. Fast 128-bit checksums for deduplication, ETags, and cache keys — not for security.
SHA-1 Hash
Generate SHA-1 (160-bit) hashes from text in your browser. Legacy algorithm — SHAttered collision attacks proven in 2017; use SHA-256 for new work.
SHA-256 Hash
Generate SHA-256 (256-bit) hashes from text in your browser. The modern default for digital signatures, TLS certificates, and Bitcoin addresses.
SHA-512 Hash
Generate SHA-512 (512-bit) hashes from text in your browser. Longer digest than SHA-256, often faster on 64-bit CPUs.
Features
- Generate MD5, SHA-1, SHA-256, and SHA-512 hashes
- Hash any text input in real-time
- Compare hash outputs across multiple algorithms
- Copy hash values to clipboard
How to Use
- Enter or paste your text into the input field
- View hash values generated across all algorithms
- Click any hash value to copy it to your clipboard
- Use the hashes for data integrity verification
Frequently Asked Questions
Is MD5 still safe to use?
Not for anything that matters. Collision attacks are trivial — you can craft two different inputs with the same MD5 in seconds. Still fine for non-security uses: file deduplication, ETag generation, cache keys. Anywhere an attacker might choose the input, use SHA-256 or better.
Should I use SHA-256 or SHA-512?
SHA-256 is the right default for almost every use case — short output, broadly supported, no known weaknesses. SHA-512 has the same security strength and a larger output; prefer it when you want more entropy bits in tokens or if you're on a 64-bit CPU where SHA-512 is actually faster than SHA-256.
How do I hash a password?
Not with any of these. Password storage needs a slow function with a per-user salt — argon2id, bcrypt, or scrypt. MD5 and SHA hashes run in nanoseconds, which means a leaked hash database can be brute-forced in hours. Never store plain SHA-hashed passwords.
Do all these hash functions always produce the same length output?
Yes — that's the point of a fixed-size hash. MD5: 128 bits (32 hex). SHA-1: 160 bits (40 hex). SHA-256: 256 bits (64 hex). SHA-512: 512 bits (128 hex). Any input from 1 byte to a terabyte produces exactly that many bits of output.
Is my input sent to a server?
No — all hashing runs through the SubtleCrypto browser API in your tab. That matters for inputs like API tokens, file contents, or anything sensitive: a hash function applied to a secret is still bound to that secret, and logging either would be a leak.