Skip to main content
~/makemydev/hash-generator

$hash-generator

Generators

Compute cryptographic checksums for text or files. Supports MD5, SHA-1, SHA-256, SHA-384, and SHA-512. Everything runs in your browser — files are never uploaded.

Text is encoded as UTF-8 before hashing.

Type or paste text above to see hashes

How to use the hash generator

A hash function reduces any input — a password, a file, a JSON blob — to a fixed-length fingerprint. Two identical inputs always produce the same hash; a single byte change produces a completely different one. That makes hashes the standard tool for file integrity checks, deduplication, cache keys, and commit identifiers.

  1. Choose text or file mode. Text is UTF-8 encoded before hashing, so what you paste is exactly what gets hashed — no trailing newlines unless you add them. File mode reads the raw bytes.
  2. Paste or pick your input. All five hashes are computed at once so you can compare against the published checksum in any format the vendor happens to use.
  3. Copy the value you need. Each row has a copy button. Paste into a sha256sum -c file, a CI cache key, or your verification checklist.

Which hash should I use?

  • SHA-256for almost everything. It’s the default in TLS, Git, package registries, and nearly every modern spec.
  • SHA-512when you want a longer digest and your CPU is 64-bit — it’s often faster than SHA-256 on modern hardware.
  • MD5 only for non-security uses like ETags, deduplication, or verifying downloads from legacy mirrors. MD5 collisions are trivial to construct — never use it for passwords or signatures.
  • SHA-1 is deprecated for signatures (Git is phasing it out, browsers rejected it years ago). Fine for internal checksums; not fine for trust decisions.

A note on password hashing: plain MD5/SHA-* are the wrong tool. Use bcrypt, scrypt, or Argon2 — they are intentionally slow and include salting. The hashes here are for integrity and identity, not credentials.