ToolJutsu
All tools
Developer Tools

Hash Generator

Generate MD5, SHA-1, SHA-256, and SHA-512 hashes.

Input source

A note on security: MD5 and SHA-1 are fast but cryptographically broken. They are fine for checksums, file fingerprinting and deduplication, but never use them for security or password storage — use SHA-256 or stronger there.

Processed on your device. We never see your files.

How to use Hash Generator

What this tool does

The Hash Generator computes four cryptographic digests of any input — MD5, SHA-1, SHA-256 and SHA-512 — and shows them all at once. You can hash typed text, with the digests updating live on every keystroke, or hash a file by dropping it onto the page. Each result sits in its own row with a copy button, ready to paste into a checksum file, a verification command, or a bug report. MD5 is calculated with a small JavaScript library; the SHA family uses your browser’s native Web Crypto API. Everything runs locally, so neither your text nor your files ever leave your device.

Why you might need it

Hashes are everywhere in software work. A download page publishes a SHA-256 so you can confirm a file arrived intact. A build pipeline fingerprints assets so identical files are cached and deduplicated. A database stores a hash instead of raw content to check for changes cheaply. When you need to answer “are these two things actually identical?” or “did this file download correctly?”, a hash is the fastest reliable answer. Having all four common algorithms side by side is convenient because different systems expect different ones — a vendor might publish an MD5 while a Linux package mirror publishes a SHA-256.

How to use it

  1. Choose an input source with the toggle: Text or File.
  2. In Text mode, type or paste into the box. All four digests appear instantly and refresh as you edit.
  3. In File mode, drop a file onto the dashed area or click it to open a file picker. The file name and size are shown while it is hashed.
  4. Read the four digest rows below. Click the copy icon on any row to copy that value, or compare it against a checksum you were given.

Because hashing is deterministic, the same input always produces the same digest — so you can paste a known checksum elsewhere and check it character for character.

Common pitfalls

The most common mistake is hashing the wrong representation of your data. Hashing the text “report.pdf” is completely different from hashing the contents of a file called report.pdf — use File mode when you want to verify a download. Whitespace matters too: a trailing newline or a stray space changes the digest entirely, which is often why a checksum “does not match” when the underlying file is fine. Encoding is another trap: this tool hashes text as UTF-8 bytes, so if another system used a different encoding the digests will differ. Finally, do not assume two short hashes that share a prefix are the same value — always compare the full string.

Tips and advanced use

When verifying a download, copy the published checksum, hash the file here, and compare the two digests directly — it is faster than typing a command-line tool and works on any device. For file deduplication, SHA-256 is a good balance of speed and collision resistance. If you are storing passwords, none of these algorithms is appropriate on its own: use a purpose-built password hash such as bcrypt, scrypt or Argon2, which are deliberately slow and salted. Treat MD5 and SHA-1 strictly as integrity checks for accidental corruption, never as proof of authenticity. And because every byte is processed locally, it is genuinely safe to hash confidential documents or secret strings here — nothing is uploaded, logged, or transmitted.

Frequently asked questions

Is my text or file uploaded to compute the hash?
No. Hashing happens entirely inside your browser — MD5 runs in JavaScript and the SHA digests use the built-in Web Crypto API. Your text and files are never sent anywhere, which you can confirm in your browser's Network tab.
Which hash should I use?
Use SHA-256 as a sensible default. SHA-512 is a stronger choice for long-term integrity. MD5 and SHA-1 are fine for non-security checksums and file fingerprinting but should never be relied on for security.
Why are MD5 and SHA-1 called broken?
Researchers have produced practical collisions for both: two different inputs that share the same digest. That defeats their use for verifying authenticity or signing, although they remain useful for spotting accidental corruption.
Can I hash large files?
Yes. The tool reads the whole file into memory and hashes it on your device, so very large files (hundreds of megabytes) use proportional memory and may take a moment. For everyday files it is effectively instant.
Why does an empty input produce no hash?
The tool clears the output when the text box is empty so you do not see a digest for nothing. As soon as you type a character, all four hashes appear and update live.

Related tools