Hash Generator

Generate MD5, SHA-1, SHA-256, and other hash values from text.

Note: All hashing is done locally in your browser. No data is sent to any server.

MD5, SHA-256 & Hash Algorithm Reference

1. Enter your input

Type or paste any text string — a password, file path, API key, or any data you want to hash. The hash is generated client-side in your browser, so the input never leaves your device.

2. Choose an algorithm

Select MD5 for checksums, SHA-256 for security-sensitive applications, bcrypt for password storage, or SHA-512 for maximum hash length. Each produces a fixed-length output regardless of input size.

3. Copy the hash

Click to copy the generated hash. Use it to verify file integrity, check a stored password hash, generate a checksum, or test security tooling.

Hash Algorithm Comparison

AlgorithmOutput LengthSecurityCommon Use
MD532 hex chars (128-bit)Broken — collision attacks knownFile checksums, non-security deduplication
SHA-140 hex chars (160-bit)Deprecated — collision attacks existLegacy systems, Git commit hashes
SHA-25664 hex chars (256-bit)Strong — currently secureSSL certificates, blockchain, digital signatures
SHA-512128 hex chars (512-bit)Very strongHigh-security data integrity, long-term archiving
bcrypt60 chars (includes salt)Strong — designed to be slowPassword hashing and storage in databases
NTLM32 hex chars (128-bit)Weak — vulnerable to pass-the-hashWindows authentication (legacy)

SHA-256 Hash Examples

Input: "" (empty string)SHA-256: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Input: "hello"SHA-256: 2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824
Input: "Hello, World!"SHA-256: dffd6021bb2bd5b0af676290809ec3a53191dd81c7f70a4b28688a362182986d
Input: "password"SHA-256: 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8

What is a Hash Function?

A cryptographic hash function takes any input and produces a fixed-length output (the hash or digest). The same input always produces the same hash — but even a tiny change to the input (one character, one space) produces a completely different hash. This property is called the avalanche effect.

Hash functions are one-way: you can compute the hash from the input, but you cannot reverse a hash to recover the original input. This makes them useful for verifying integrity (checking a file hasn't been tampered with), storing passwords safely (store the hash, not the password), and creating digital signatures.

Not all hash algorithms are equal for security. MD5 and SHA-1 have known weaknesses and should not be used for security-sensitive purposes. For password storage specifically, use bcrypt, scrypt, or Argon2 — these are designed to be computationally expensive to resist brute-force attacks.

Frequently Asked Questions

Common questions about Hash Generator