Hash Generator
Generate cryptographic hashes: MD5, SHA1, SHA256, SHA384, SHA512. All calculations are performed locally in your browser.
Free Tool
MD5 / SHA
Secure
Generate Hash
Algorithm Comparison
| Algorithm | Size | Security | Use Case |
|---|---|---|---|
| MD5 | 128 bit | Weak | Checksums |
| SHA1 | 160 bit | Deprecated | Git commits |
| SHA256 | 256 bit | Secure | Industry standard |
| SHA384 | 384 bit | Secure | TLS, certificates |
| SHA512 | 512 bit | Secure | Cryptography |
About Hashing
What is a hash?
A hash is the result of a one-way cryptographic function. Original data cannot be recovered from a hash.
Use Cases
- • File integrity verification
- • Password storage
- • Digital signatures
- • Blockchain
- • Data deduplication
Privacy
All hashes are calculated locally in your browser using Web Crypto API. Data is never sent to a server.
Important
MD5 and SHA1 are not recommended for cryptographic purposes. Use SHA256 or higher for security.
Automated monitoring of your infrastructure
EASM automatically monitors DNS, certificates, open ports and vulnerabilities. Get notified about changes.
Learn about EASM
EN
Русский