Hash Generator
Generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes from any text input. All five hashes update instantly as you type.
Related tools
About Hash Functions
A cryptographic hash function takes an input of any length and produces a fixed-length output (the hash or digest). The same input always produces the same output, but even a tiny change to the input produces a completely different hash. This makes hashes useful for verifying data integrity, storing passwords securely, and building digital signatures.
Algorithm comparison
| Algorithm | Output length | Status |
|---|---|---|
| MD5 | 128 bits (32 hex chars) | Broken — avoid for security |
| SHA-1 | 160 bits (40 hex chars) | Deprecated for security use |
| SHA-256 | 256 bits (64 hex chars) | Secure — widely used |
| SHA-384 | 384 bits (96 hex chars) | Secure |
| SHA-512 | 512 bits (128 hex chars) | Secure — strongest here |
When not to use this tool
These are all one-way, unsalted hashes of raw text. Do not use this tool to hash passwords for storage — always use a purpose-built password hashing function (bcrypt, Argon2, or scrypt) with a unique salt. This tool is intended for verifying file integrity, computing checksums, and development/debugging use cases.
Privacy
Hashing runs entirely in your browser. SHA-* hashes use the browser's built-in Web Crypto API; MD5 is computed with a pure JavaScript implementation. No input text is sent to any server. Learn more about how Dev-Utilities handles privacy.