Home All Algorithms File Hash bcrypt Verify Hash Blog MD5 SHA-1 SHA-256 SHA-512 FAQ More Tools
100% Client-Side · Text never leaves your browser

Hash any text or file
in milliseconds

The four hashes you actually need — MD5, SHA-1, SHA-256, SHA-512 — computed live, in your browser, for text you paste or files you drop. Need more algorithms? See all 10 →

Input Text
Drop a file here, or click to browse
All hashing happens locally — file never leaves your device
Supports any file type · Tested up to ~500 MB
filename.ext
size: 0 B
Reading…0%
Common Hash Results
Showing 4 most-used algorithms
Copy all 4 hash values as formatted text

Need SHA-224, SHA-384, CRC-32, Adler-32, FNV-1a, or DJB2?

View all 10 algorithms on one page →
Dedicated Pages
Or jump to a specific algorithm

Each algorithm has its own page with in-depth notes, examples and use cases — and supports both text and file input.

MD5
128-bit · 32 hex chars
Fast legacy hash. Fine for checksums and deduplication; not safe for security.
⚠ Legacy
SHA-1
160-bit · 40 hex chars
Used in git, older TLS certs. Deprecated for new security work.
✕ Deprecated
SHA-256
256-bit · 64 hex chars
Modern default. Used in TLS, Bitcoin, code signing. Pick this if unsure.
✓ Recommended
SHA-512
512-bit · 128 hex chars
Higher-security cousin of SHA-256. Used for long-term archival integrity.
✓ Secure
SHA-224
224-bit · 56 hex chars
Truncated SHA-256. Used where shorter digests are required.
✓ Secure
SHA-384
384-bit · 96 hex chars
Truncated SHA-512. Common in some TLS suites and Suite B crypto.
✓ Secure
CRC-32
32-bit · 8 hex chars
Error-detection checksum used in ZIP, PNG, Ethernet. Not cryptographic.
Adler-32
32-bit · 8 hex chars
Faster but weaker than CRC-32. Used inside zlib/Deflate streams.
FNV-1a
32-bit · 8 hex chars
Tiny, fast non-crypto hash. Common in hash tables and bloom filters.
DJB2
32-bit · 8 hex chars
Dan Bernstein's classic string hash. Compact, simple, surprisingly effective.
How It Works
Hashing in your browser, not on our server

Every hash is computed by your browser using the Web Crypto API plus a small amount of hand-rolled JavaScript for legacy algorithms. Your text and files never leave your device.

🔒

100% Private

Text and files stay on your device. Open the browser Network tab while hashing — you'll see zero outgoing requests with your data.

Live Updates

Text hashes update as you type. File hashes start the moment you drop a file. No "Generate" button needed.

📂

Any File Type

Drop in images, PDFs, archives, binaries, source code — anything. The hash is computed over the raw bytes, exactly like sha256sum on the command line.

🔢

HEX, Base64, Decimal

Switch encoding without re-entering anything. HEX is the default everywhere; Base64 is common in APIs and JWTs.

Choosing an Algorithm
Which hash should you actually use?

A quick guide. When in doubt, use SHA-256 — that's the right answer ~90% of the time in 2026.

🛡️

SHA-256 — The default

Modern standard. Used in TLS certificates, code signing, Bitcoin, and most "give me a hash" situations. If you don't know what to pick, pick this.

🔐

SHA-512 — Stronger margin

Double the digest length of SHA-256. Useful for long-term archival, large data, or systems that expect 64-byte digests.

📦

MD5 / SHA-1 — Non-security uses

Both are cryptographically broken — but still fine for deduplication, cache keys, casual file checksums, and matching against existing legacy hashes.

CRC-32 — Error detection

Not a cryptographic hash. Detects accidental corruption in files and network packets. Used in ZIP, PNG, Ethernet frames.

🚀

FNV-1a / DJB2 — Fast & tiny

Designed for hash tables and bloom filters, not security. Very fast, very small, decent distribution.

⚠️

Never use any of these for passwords

For password storage, use a dedicated password hash: bcrypt, scrypt, or Argon2id. Raw cryptographic hashes are far too fast and have no per-user salt.

Our Network
FAQ
Frequently asked questions
What is a hash function and how does it work?
A hash function takes any input (text, file, or arbitrary data) and produces a fixed-length output called a hash, digest, or fingerprint. Good hash functions have three key properties: (1) the same input always produces the same hash, (2) any change to the input produces a completely different hash (the avalanche effect), and (3) it is computationally infeasible to reverse a hash back to its input. Cryptographic hash functions like SHA-256 add a fourth property: collision resistance — it is infeasible to find two different inputs with the same hash.
What is the best hash algorithm to use in 2026?
For most use cases, SHA-256 is the best choice in 2026. It is widely supported, cryptographically secure, fast on modern hardware, and the default in virtually all current security protocols (TLS, code signing, cryptocurrencies). Use SHA-512 when you want a larger security margin or when working with 64-bit-optimized systems. Use MD5 or SHA-1 only for legacy compatibility — both are cryptographically broken. Use CRC-32 only for non-security error detection. For passwords, never use any plain hash — use Argon2id, bcrypt, or scrypt.
Are these hash generators free? Is there a usage limit?
Yes, this hash generator is 100% free with no usage limits. There is no signup, no registration, no payment, no daily quota. Hash as many strings or files as you want. The tool is completely client-side — your inputs are processed in your browser, so there are no per-user server costs to limit. Files are limited only by your browser's available memory.
Is my data safe? Where does my text or file go?
Your data is 100% safe — it never leaves your device. All hash calculation runs entirely in your browser using JavaScript and the Web Crypto API. There are no server uploads, no logging of inputs, and no tracking of what you hash. You can verify this yourself by opening browser DevTools, switching to the Network tab, and hashing some data — you will see zero outgoing requests carrying your input. This makes the tool safe for sensitive data, confidential documents, and proprietary files.
How do I generate an MD5, SHA-256, or SHA-512 hash for a string or file?
On this page, paste your text into the input box and the common hashes (MD5, SHA-1, SHA-256, SHA-512) appear instantly. To hash a file, click the File tab and drag your file onto the drop zone. Need a different algorithm or all 10 at once? Use the All Algorithms page. Each algorithm also has its own dedicated page with detailed explanation and use cases.
What is the difference between MD5, SHA-1, SHA-256, and SHA-512?
All four produce fixed-length hashes of any input, but with different output sizes and security levels. MD5 (128-bit, broken) and SHA-1 (160-bit, broken) are legacy algorithms with known collision attacks — fine for checksums, not for security. SHA-256 (256-bit) is the modern standard with no known practical attacks. SHA-512 (512-bit) provides a larger security margin and is faster on 64-bit CPUs. For new projects use SHA-256 or SHA-512; use MD5/SHA-1 only for legacy compatibility.
Can hashes be reversed or decrypted?
No — cryptographic hash functions are one-way by design. Given a hash, there is no efficient algorithm to recover the original input. However, common or short inputs (like 'password' or 'admin123') can be found via rainbow tables — precomputed databases of common inputs and their hashes. This is why password storage should always use salted, slow hash functions like Argon2id, never plain SHA-256.
How accurate is this hash generator? Do the hashes match command-line tools?
Yes, the hashes generated by this tool are byte-identical to those produced by standard command-line tools (md5sum, sha256sum, sha512sum, certutil, openssl dgst) when applied to the same input bytes. The cryptographic hashes use your browser's built-in Web Crypto API, which implements the NIST FIPS standards. The CRC-32 uses the IEEE 802.3 polynomial standard. We have verified outputs against published test vectors for all 10 algorithms.
What is a checksum and how is it different from a hash?
The terms are often used interchangeably, but technically: a checksum is a short value used to detect accidental errors (CRC-32, Adler-32, Internet Checksum), while a cryptographic hash is designed to detect both accidental and intentional changes (MD5, SHA family). All cryptographic hashes can serve as checksums, but not all checksums are cryptographic hashes. Use 'checksum' for error detection (CRC-32) and 'hash' for security applications (SHA-256).
Why would I need a file hash generator?
Common reasons: (1) Verifying downloads — comparing a downloaded file's SHA-256 against the value published by the source to confirm the file isn't corrupted or tampered with. (2) Detecting duplicates — two files with the same hash are byte-identical. (3) Forensics and evidence — proving a file hasn't been modified since a known time. (4) Database deduplication — using hashes as content-addressable identifiers. (5) Software distribution — package managers verify integrity via hashes. (6) Build reproducibility — confirming that a build output matches an expected hash.