Hash Generator
Generate various hash values from text or files
Input Type
Enter a secret key if using HMAC algorithms
Enter salt to add to text
Generated Results
MD5
(None)
SHA-1
(None)
SHA-224
(None)
SHA-256
(None)
SHA-384
(None)
SHA-512
(None)
SHA-3
(None)
RIPEMD160
(None)
bcrypt
(None)
scrypt
(None)
Argon2
(None)
HMAC-SHA256
(None)
HMAC-SHA384
(None)
HMAC-SHA512
(None)
CRC32
(None)
How to use
About this tool
Generates MD5, SHA-1, SHA-256, and other hashes from text or files.
How to use
Enter text or select a file; choose algorithms; view and copy hashes.
Options
Input: Text or file. For text: MD5, SHA-1, SHA-224/256/384/512, SHA-3, RIPEMD160, bcrypt, scrypt, Argon2, HMAC-SHA256/384/512, CRC32. For HMAC: optional secret key and salt. Toggle output upper/lowercase. For file: algorithms except password hashes and HMAC.
Use cases
• Integrity checks • Password hash comparison • File identity • ETag calculation
Code Examples
1crypto.createHash('sha256').update('text').digest('hex');1hashlib.sha256(b"text").hexdigest()1hash('sha256', 'text');Privacy and data
Hashing is done in-browser; text and files are not sent to a server.
FAQ
- Q: Which hash algorithms are available?
- A: For text input: MD5, SHA-1, SHA-224/256/384/512, SHA-3, RIPEMD160, bcrypt, scrypt, Argon2, HMAC-SHA256/384/512, and CRC32. For file input: the same list excluding password hash algorithms (bcrypt, scrypt, Argon2) and HMAC.
- Q: Which algorithm should I use for password hashing?
- A: Use bcrypt, scrypt, or Argon2 — all three are purpose-built for passwords and include salting and work factors that slow down brute-force attacks. Never use MD5 or SHA-1 for passwords; they are fast general-purpose hashes and insecure for password storage.
- Q: What is HMAC and when should I use it?
- A: HMAC (Hash-based Message Authentication Code) combines a hash with a secret key to verify both integrity and authenticity. Use it when you need to ensure a message has not been tampered with and was sent by a party that knows the secret key — for example, API signatures and webhook verification.
- Q: Can I hash a file to verify its integrity?
- A: Yes. Select a file and the tool computes its SHA-256 (or other selected algorithm) hash. Compare the hash to the one provided by the download source to verify the file has not been modified or corrupted.
- Q: Does this tool send my text or files to a server?
- A: No. All hashing is performed entirely in the browser. Your text and files are never sent to any server.
