#️⃣

Hash Generator

Generate MD5, SHA-1, SHA-256 hashes

Input Text

About Hash Generator

Generate cryptographic hashes from any string. SHA-256 and SHA-512 use the browser's WebCrypto API, which is the same engine your OS uses. MD5 and SHA-1 are included for legacy compatibility, but should not be used for security-sensitive applications — both are cryptographically broken. Common uses: verifying data integrity, generating checksums, understanding how password hashing works (though bcrypt/argon2 are used in production, not plain SHA-256), and any situation where you need a deterministic fixed-length representation of input data. Nothing is transmitted — hashing runs entirely locally.

Common Use Cases

  • Generating checksums to verify file or data integrity
  • Creating content-based cache keys
  • Understanding hash functions for security learning
  • Generating test fixtures with known hash values

Frequently Asked Questions

Can I reverse a hash to get the original text?+
No — hash functions are one-way by design. Given a hash, you cannot recover the original input through computation. Short or common inputs can be cracked via rainbow tables (pre-computed hash lookups), which is why passwords need a salt.
Is MD5 safe to use?+
Not for security. MD5 has known collision vulnerabilities — it is possible to craft two different inputs with the same MD5 hash. It is still fine for non-security uses like basic checksums or cache keys where collision resistance does not matter.
Why not use SHA-256 for password storage?+
SHA-256 is too fast — a modern GPU can try billions of SHA-256 hashes per second. Password hashing needs an intentionally slow algorithm like bcrypt, scrypt, or Argon2 to make brute-force attacks impractical.