All tools

Hash Generator

MD5, SHA-256, SHA3, BLAKE2, file checksums, HMAC, bcrypt, Argon2, and more — all in your browser. No data leaves your device.

100% in-browserNo signupFree forever
Runs fully in your browserNo data leaves your deviceNo hashes stored
Output encoding
Output

Type above to see hashes.

Related tools

What Is a Hash Generator?

A hash generator turns any input — text or file — into a fixed-length fingerprint called a hash or checksum. The same input always produces the same hash; a single-bit change produces a completely different one. Hashes are used for integrity checks, digital signatures, password storage, API signing, and verifying downloads.

How it works

Generate Any Hash in Seconds

01

Paste text or drop a file

Type directly, paste a string, or drag a file of any size into the File tab.

02

Pick an algorithm

Choose MD5, SHA-256, SHA3, BLAKE2, HMAC, bcrypt, Argon2, and more.

03

Copy the hash

Output updates instantly. Copy the hex, Base64, or binary result.

04

Verify with one click

Paste an expected hash into Verify mode for constant-time comparison.

Use cases

When to Use Each Hash Algorithm

Verify File Downloads

Drop a file in File mode, select SHA-256, compare against the published checksum.

🔑

API & Webhook Signing

Use HMAC-SHA256 to sign request payloads and verify GitHub, Stripe, or Shopify webhooks.

🔒

Password Hashing

Hash passwords with bcrypt or Argon2 — slow by design, salted, and resistant to brute force.

🗂️

Content ETags

Generate MD5 or SHA-1 checksums for cache ETag headers.

🛡️

Data Integrity

Hash config files or build artifacts to detect unauthorized changes.

📊

Deduplication

Use SHA-256 to fingerprint data blobs and deduplicate storage.

MD5 vs SHA-1 vs SHA-256 vs SHA3 vs BLAKE2

AlgorithmOutputSecurityBest for
MD5128-bit❌ BrokenCache keys, non-security ETags
SHA-1160-bit⚠️ DeprecatedLegacy only
SHA-256256-bit✅ RecommendedFile verification, signing, TLS
SHA3-256256-bit✅ ModernSHA-2 alternative
BLAKE2b256–512-bit✅ Fast & securePerformance-critical hashing
bcryptvariable✅ For passwordsPassword storage
Argon2variable✅ Best-in-classNew app password hashing

HMAC for API Signing and Webhook Verification

HMAC (Hash-based Message Authentication Code) combines a message with a secret key to produce a value only the key-holder can reproduce. Platforms like GitHub, Stripe, Shopify, and Twilio sign webhook payloads with HMAC-SHA256. Paste the payload and your secret into the HMAC tab to generate or verify a signature — all without sending your secret to any server.

FAQ

Frequently Asked Questions

1How do I verify a downloaded file's SHA-256 checksum?
Switch to File mode, drag your downloaded file in, select SHA-256. Compare the output against the checksum on the download page. Use Verify mode to paste the expected checksum and have the comparison done for you.
2What is the difference between MD5 and SHA-256?
MD5 is 128-bit and cryptographically broken — collision attacks exist. SHA-256 is 256-bit and the current recommended standard for file verification, signing, and TLS. Use SHA-256 for all security-related hashing.
3What is HMAC and when do I need it?
HMAC adds a secret key to a hash so only someone with the same key can reproduce the value. Use it for API request signing, webhook verification (GitHub, Stripe, Shopify), and anywhere you need integrity plus authenticity.
4bcrypt vs Argon2 — which should I use for passwords?
Both are slow, salted, and brute-force-resistant. Argon2 won the Password Hashing Competition in 2015 and is the current recommendation for new applications. bcrypt is still widely used and secure. Never use MD5 or plain SHA-256 for passwords.
5Is it safe to hash sensitive files or text here?
Yes. All hashing runs entirely in your browser using the Web Crypto API. Your files and text are never uploaded or sent to any server.
6What is constant-time hash comparison?
Comparing hashes character-by-character leaks timing information (early exit on first mismatch). Constant-time comparison takes the same time regardless of where hashes differ, preventing timing attacks. This tool's Verify mode uses constant-time comparison.
Learn more

Developer Guides

Feedback for hash_generator

Tell us what's working, what's broken, or what you wish we built next — it directly shapes our roadmap.

You make the difference

Good feedback is gold — a rough edge you hit today could be smoother for everyone tomorrow.

  • Feature ideas often jump the queue when lots of you ask.
  • Bug reports with steps get fixed faster — paste URLs or examples if you can.
  • Name and email are optional; we won't use them for anything except replying if needed.

Stay Updated

Get the latest tool updates, new features, and developer tips delivered to your inbox.

What you'll get
  • Product updates & new tools
  • JSON, API & developer tips
  • Unsubscribe anytime — no hassle

Get in touch

Feature ideas, bugs, or a quick thanks — we read every message.