Hash Generator
Drag & drop a file here, or browse
100% client-side — nothing is uploaded
About These Algorithms
Legacy, not collision-resistant. Use for checksums only.
Deprecated for security. Still used in Git.
Industry standard. Used in TLS, Bitcoin, code signing.
Truncated SHA-512. Common in government systems.
Strongest SHA-2 variant. Faster than SHA-256 on 64-bit CPUs.
Frequently Asked Questions
Common questions about Hash Generator
Type or paste your text in the input field. The SHA-256 hash (and four other algorithms) is computed instantly as you type. Click the copy button next to the SHA-256 result to copy it. You can also hash files by dragging them into the drop zone.
MD5 produces a 128-bit (32-character) hash and is fast but considered cryptographically broken — do not use it for security. SHA-256 produces a 256-bit (64-character) hash and is currently secure. Use SHA-256 for file integrity verification, password hashing, and security applications.
Yes. Drag and drop any file into the drop zone. The file is read in your browser using the FileReader API and hashed locally using the Web Crypto API. The file never leaves your device — no upload, no server processing.
Use the Hash Comparison section at the bottom. Paste two hash values and the tool shows whether they match (green checkmark) or differ (red X). The comparison is case-insensitive, so 'abc123' matches 'ABC123'.
MD5 is not safe for cryptographic purposes (passwords, signatures, certificates) because collisions can be generated. However, it is still commonly used for non-security purposes like checksum verification, cache keys, and data deduplication where collision resistance is not critical.