HASH Generator & Verifier

Generate cryptographic hashes from text and files. MD5, SHA-1, SHA-256, SHA-512, and SHA-3. All processing happens locally in your browser.

Text Input

0 characters

Select Algorithms

File Upload

📁

Drag & drop a file here

or click to browse

Max 100MB for best performance

Batch File Hashing

0 files
📚

Drag & drop multiple files here

or click to browse

Select multiple files to hash at once

No files selected

HMAC Generator

💡 Common Use Cases

  • API Authentication: Sign API requests with HMAC
  • Webhook Verification: Verify webhook payloads
  • Message Authentication: Ensure message integrity
  • JWT Signing: Sign JSON Web Tokens

Hash Comparison

Enter hashes to compare

💡 How to Use

  1. Generate a hash from your file/text (using Text or File mode)
  2. Copy the generated hash
  3. Paste it in "Hash 1" field above
  4. Paste the expected/known hash in "Hash 2" field
  5. Compare to verify they match

Common use: Verify downloaded files haven't been corrupted or tampered with.

Checksum File Verification

Paste checksum file contents above

💡 How to Use

  1. Copy contents from a .sha256, .md5, or checksum file
  2. Paste it in the text area above
  3. Select the files you want to verify
  4. Click "Verify Files" to check integrity

Tip: Download pages often provide checksum files to verify your downloads.

What Are Hashes?

🔐 What is a Hash?

A hash is a unique fixed-size string generated from input data using a mathematical algorithm. The same input always produces the same hash, but even tiny changes create completely different hashes.

🎯 When to Use Hashes

  • File Integrity: Verify downloads aren't corrupted
  • Password Storage: Store hashed passwords, not plaintext
  • Digital Signatures: Prove authenticity
  • Data Deduplication: Identify duplicate files
  • Blockchain: Bitcoin and cryptocurrencies

📊 Which Algorithm to Use?

  • MD5 ❌ Broken - Don't use for security
  • SHA-1 ⚠️ Weakened - Being phased out
  • SHA-256 ✅ Recommended - Industry standard
  • SHA-512 ✅ More secure - Longer hash
  • SHA-3 ✅ Modern - Latest standard

⚠️ Security Notes

  • Hashing is NOT encryption (cannot be reversed)
  • Hashes are deterministic (same input = same output)
  • Even 1 byte change creates completely different hash
  • Use for verification, not hiding secrets
  • Never store passwords in plaintext!