Hash Generator

Generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes from any text instantly. Free, client-side, no data sent to any server.

Algorithm
SHA-256 Hash

What is a hash?

A cryptographic hash function takes an input of any size and produces a fixed-length string of characters (the "digest"). The same input always produces the same hash, but even a tiny change in the input produces a completely different output.

Supported algorithms

  • MD5 (128-bit): fast but cryptographically broken. Still used for checksums and non-security applications.
  • SHA-1 (160-bit): deprecated for security use. Collision attacks are practical.
  • SHA-256 (256-bit): part of the SHA-2 family. Widely used in TLS certificates, Bitcoin, and data integrity checks.
  • SHA-384 (384-bit): truncated version of SHA-512. Used in some TLS cipher suites.
  • SHA-512 (512-bit): strongest SHA-2 variant. Preferred when maximum security margin is needed.

Common uses

  • Verifying file integrity (comparing checksums after download)
  • Password storage (hashed, never stored in plain text)
  • Digital signatures and certificates
  • Blockchain and cryptocurrency
  • Data deduplication

Frequently Asked Questions

Is my text sent to a server? No. All hashing runs entirely in your browser using the Web Crypto API (SHA) or a JavaScript implementation (MD5). Nothing is uploaded.

Can I reverse a hash to get the original text? No. Cryptographic hash functions are one-way. You cannot derive the input from the hash. Attackers use precomputed tables (rainbow tables) or brute force, which is why strong, salted hashing is important for passwords.

Which algorithm should I use? For general-purpose integrity checks, SHA-256 is the standard choice. Avoid MD5 and SHA-1 for anything security-related.