Generate MD5, SHA-1, SHA-256, and other hash values from text.
Note: All hashing is done locally in your browser. No data is sent to any server.
Type or paste any text string — a password, file path, API key, or any data you want to hash. The hash is generated client-side in your browser, so the input never leaves your device.
Select MD5 for checksums, SHA-256 for security-sensitive applications, bcrypt for password storage, or SHA-512 for maximum hash length. Each produces a fixed-length output regardless of input size.
Click to copy the generated hash. Use it to verify file integrity, check a stored password hash, generate a checksum, or test security tooling.
| Algorithm | Output Length | Security | Common Use |
|---|---|---|---|
| MD5 | 32 hex chars (128-bit) | Broken — collision attacks known | File checksums, non-security deduplication |
| SHA-1 | 40 hex chars (160-bit) | Deprecated — collision attacks exist | Legacy systems, Git commit hashes |
| SHA-256 | 64 hex chars (256-bit) | Strong — currently secure | SSL certificates, blockchain, digital signatures |
| SHA-512 | 128 hex chars (512-bit) | Very strong | High-security data integrity, long-term archiving |
| bcrypt | 60 chars (includes salt) | Strong — designed to be slow | Password hashing and storage in databases |
| NTLM | 32 hex chars (128-bit) | Weak — vulnerable to pass-the-hash | Windows authentication (legacy) |
A cryptographic hash function takes any input and produces a fixed-length output (the hash or digest). The same input always produces the same hash — but even a tiny change to the input (one character, one space) produces a completely different hash. This property is called the avalanche effect.
Hash functions are one-way: you can compute the hash from the input, but you cannot reverse a hash to recover the original input. This makes them useful for verifying integrity (checking a file hasn't been tampered with), storing passwords safely (store the hash, not the password), and creating digital signatures.
Not all hash algorithms are equal for security. MD5 and SHA-1 have known weaknesses and should not be used for security-sensitive purposes. For password storage specifically, use bcrypt, scrypt, or Argon2 — these are designed to be computationally expensive to resist brute-force attacks.
Common questions about Hash Generator