Hash Generator
Generate MD5, SHA, SHA3, and HMAC digests from text or files
Enter text above or upload a file to generate hashes
Supports UTF-8, Latin-1, and Hex input encoding with Hex/Base64/Base64URL output. Includes MD5, SHA-1, SHA-256, SHA-512, and SHA3-256, plus keyed HMAC. MD5 and SHA-1 are provided for compatibility — use SHA-256 or stronger for security-sensitive applications. All processing happens locally. File upload hashing is capped at 16 MB for responsiveness.
About Hash Generator
Generate cryptographic hash digests and HMAC values for text input using industry-standard algorithms. Hashing is a one-way function that produces a fixed-size fingerprint of any input data, used for integrity verification, password storage, digital signatures, and data deduplication. This tool supports MD5, SHA-1, SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-512, and HMAC variants with a secret key. All hashing runs locally in your browser using the audited @noble/hashes library — your data and keys are never sent to a server.
How to Use Hash Generator
- Enter or paste text into the input field.
- Select a hash algorithm from the dropdown (SHA-256, MD5, SHA-512, etc.).
- For HMAC, enable the HMAC option and enter your secret key.
- View the hash digest in the output area and copy it with the copy button.
Hash Generator FAQ
Which hash algorithm should I use for security?
Use SHA-256 or stronger (SHA-384, SHA-512, SHA3) for new systems. MD5 and SHA-1 are provided for legacy compatibility but are considered weak against collision attacks.
What is HMAC?
HMAC (Hash-based Message Authentication Code) is a keyed hash that provides both integrity and authenticity verification. Both sender and receiver must share the same secret key.
Can I hash files?
The tool accepts text input for hashing. For file hashing, paste the file contents as text or use the CRC32 tool which supports file uploads.
Is MD5 still safe to use?
MD5 is not collision-resistant and should not be used for security-sensitive purposes. It is acceptable for non-security checksums and legacy system compatibility.
Is my data sent to a server during hashing?
No. All hash computations run locally in your browser using the @noble/hashes library. Your input text and HMAC keys remain on your device.