Hash Generator
MD5, SHA-256, SHA3, BLAKE2, file checksums, HMAC, bcrypt, Argon2, and more — all in your browser. No data leaves your device.
Type above to see hashes.
Related tools
What Is a Hash Generator?
A hash generator turns any input — text or file — into a fixed-length fingerprint called a hash or checksum. The same input always produces the same hash; a single-bit change produces a completely different one. Hashes are used for integrity checks, digital signatures, password storage, API signing, and verifying downloads.
Generate Any Hash in Seconds
Paste text or drop a file
Type directly, paste a string, or drag a file of any size into the File tab.
Pick an algorithm
Choose MD5, SHA-256, SHA3, BLAKE2, HMAC, bcrypt, Argon2, and more.
Copy the hash
Output updates instantly. Copy the hex, Base64, or binary result.
Verify with one click
Paste an expected hash into Verify mode for constant-time comparison.
When to Use Each Hash Algorithm
Verify File Downloads
Drop a file in File mode, select SHA-256, compare against the published checksum.
API & Webhook Signing
Use HMAC-SHA256 to sign request payloads and verify GitHub, Stripe, or Shopify webhooks.
Password Hashing
Hash passwords with bcrypt or Argon2 — slow by design, salted, and resistant to brute force.
Content ETags
Generate MD5 or SHA-1 checksums for cache ETag headers.
Data Integrity
Hash config files or build artifacts to detect unauthorized changes.
Deduplication
Use SHA-256 to fingerprint data blobs and deduplicate storage.
MD5 vs SHA-1 vs SHA-256 vs SHA3 vs BLAKE2
| Algorithm | Output | Security | Best for |
|---|---|---|---|
| MD5 | 128-bit | ❌ Broken | Cache keys, non-security ETags |
| SHA-1 | 160-bit | ⚠️ Deprecated | Legacy only |
| SHA-256 | 256-bit | ✅ Recommended | File verification, signing, TLS |
| SHA3-256 | 256-bit | ✅ Modern | SHA-2 alternative |
| BLAKE2b | 256–512-bit | ✅ Fast & secure | Performance-critical hashing |
| bcrypt | variable | ✅ For passwords | Password storage |
| Argon2 | variable | ✅ Best-in-class | New app password hashing |
HMAC for API Signing and Webhook Verification
HMAC (Hash-based Message Authentication Code) combines a message with a secret key to produce a value only the key-holder can reproduce. Platforms like GitHub, Stripe, Shopify, and Twilio sign webhook payloads with HMAC-SHA256. Paste the payload and your secret into the HMAC tab to generate or verify a signature — all without sending your secret to any server.
Frequently Asked Questions
1How do I verify a downloaded file's SHA-256 checksum?
2What is the difference between MD5 and SHA-256?
3What is HMAC and when do I need it?
4bcrypt vs Argon2 — which should I use for passwords?
5Is it safe to hash sensitive files or text here?
6What is constant-time hash comparison?
Developer Guides
Feedback for hash_generator
Tell us what's working, what's broken, or what you wish we built next — it directly shapes our roadmap.
Good feedback is gold — a rough edge you hit today could be smoother for everyone tomorrow.
- Feature ideas often jump the queue when lots of you ask.
- Bug reports with steps get fixed faster — paste URLs or examples if you can.
- Name and email are optional; we won't use them for anything except replying if needed.
Stay Updated
Get the latest tool updates, new features, and developer tips delivered to your inbox.
- Product updates & new tools
- JSON, API & developer tips
- Unsubscribe anytime — no hassle