Handy Dev Tools
Simple online tools for everyday tasks.

No favorites

    Base64 Encoder/Decoder
    Markdown to HTML
    HTML to Markdown
    URL Encoder/Decoder
    Unicode Escape Converter
    Unicode Encode/Decode
    SQL Formatter
    SQL Splitter
    JSON Formatter
    XML Formatter
    YAML Formatter
    GraphQL Formatter
    JSON to YAML Conversion
    YAML to JSON Conversion
    JSON to TOML Conversion
    TOML to JSON Conversion
    HTML Entity Encode/Decode
    TOML to YAML Conversion
    YAML to TOML Conversion
    CSV to SQL INSERT Conversion
    Markdown Table Generator
    JSON to XML Conversion
    XML to JSON Conversion
    UUID Generator
    ULID Generator
    Password Generator
    Hash Generator
    Lorem Ipsum Generator
    Lorem Picsum Image URL Generator
    Test Data Generator Tool
    QR Code Generator
    S3 Path Parser & Converter
    IP Address Calculator
    Subnet Split
    Subnet Consolidation
    CloudFront Signed URL Generator
    RDS Connection String Generator
    Coordinate Format Converter
    Geo Format Converter
    JWT Decoder & Parser
    Basic Auth
    Password Strength Analyzer
    Credit Card Validator
    RSA Key Pair Generator
    Case Conversion
    Romaji Conversion
    Roman Numeral Conversion
    Phonetic Code Conversion
    Character Counter
    Text Diff
    HTML Tag Remover
    Regex Tester
    Color Conversion
    Dice Roll
    Crontab generator
    Crontab parser
    Emoji Picker
    Unix Timestamp Converter
    HTTP Status Code Search
    Port Number Search
    MIME Type Lookup
    Base64 File Converter
    Image Base64 Encode/Decode
    User-Agent Parser
    URL Parser
    OGP Checker
    Commit Message Generator
    Chmod Calculator
    Terminal GIF Generator
    .env Parser & Validator
Ctrl+K

Hash Generator

Generate various hash values from text or files

Input Type
Text Input

Enter a secret key if using HMAC algorithms

Enter salt to add to text

Generated Results

MD5

(None)

SHA-1

(None)

SHA-224

(None)

SHA-256

(None)

SHA-384

(None)

SHA-512

(None)

SHA-3

(None)

RIPEMD160

(None)

bcrypt

(None)

scrypt

(None)

Argon2

(None)

HMAC-SHA256

(None)

HMAC-SHA384

(None)

HMAC-SHA512

(None)

CRC32

(None)

How to use

About this tool

Generates MD5, SHA-1, SHA-256, and other hashes from text or files.

How to use

Enter text or select a file; choose algorithms; view and copy hashes.

Options

Input: Text or file. For text: MD5, SHA-1, SHA-224/256/384/512, SHA-3, RIPEMD160, bcrypt, scrypt, Argon2, HMAC-SHA256/384/512, CRC32. For HMAC: optional secret key and salt. Toggle output upper/lowercase. For file: algorithms except password hashes and HMAC.

Use cases

• Integrity checks • Password hash comparison • File identity • ETag calculation

Code Examples

Node (crypto)
Read Only
1crypto.createHash('sha256').update('text').digest('hex');
Python (hashlib)
Read Only
1hashlib.sha256(b"text").hexdigest()
PHP
Read Only
1hash('sha256', 'text');

Privacy and data

Hashing is done in-browser; text and files are not sent to a server.

FAQ

Q: Which hash algorithms are available?
A: For text input: MD5, SHA-1, SHA-224/256/384/512, SHA-3, RIPEMD160, bcrypt, scrypt, Argon2, HMAC-SHA256/384/512, and CRC32. For file input: the same list excluding password hash algorithms (bcrypt, scrypt, Argon2) and HMAC.
Q: Which algorithm should I use for password hashing?
A: Use bcrypt, scrypt, or Argon2 — all three are purpose-built for passwords and include salting and work factors that slow down brute-force attacks. Never use MD5 or SHA-1 for passwords; they are fast general-purpose hashes and insecure for password storage.
Q: What is HMAC and when should I use it?
A: HMAC (Hash-based Message Authentication Code) combines a hash with a secret key to verify both integrity and authenticity. Use it when you need to ensure a message has not been tampered with and was sent by a party that knows the secret key — for example, API signatures and webhook verification.
Q: Can I hash a file to verify its integrity?
A: Yes. Select a file and the tool computes its SHA-256 (or other selected algorithm) hash. Compare the hash to the one provided by the download source to verify the file has not been modified or corrupted.
Q: Does this tool send my text or files to a server?
A: No. All hashing is performed entirely in the browser. Your text and files are never sent to any server.