Hash generator

Generate cryptographic hashes with 12 popular algorithms

Overview

The Hash Generator creates cryptographic hashes from text or files using 12 popular algorithms. It supports the SHA-2 family (SHA-256, SHA-512, SHA-384, SHA-224), legacy algorithms (MD5, SHA-1), the modern SHA-3 family (SHA3-256, SHA3-512, SHA3-384, SHA3-224), plus BLAKE2B and CRC32. All hashes are generated simultaneously: type or drop a file and see all 12 results instantly. Export to TXT, CSV, or JSON, or copy individual/all hashes to clipboard.

12 algorithms
MD5, SHA-1, SHA-2, SHA-3, BLAKE2B, CRC32
Auto-generate
Hashes update instantly as you type
Export options
TXT, CSV, JSON formats + clipboard
100% local
All processing happens in your browser

Interface overview

The Hash Generator has a clean, vertical layout with the input area at the top and hash output cards below. Understanding each section helps you work efficiently.

1

Input section with drop zone

At the top is the Input text section:
Drop zone: large area for typing or dropping files
TXT badge: indicates text file support
"Drop files here or start typing" placeholder text
Supports both direct text input and file drag-and-drop

2

Hash output grid

Below the input is a grid of 12 hash output cards arranged in 2 columns. Each card shows the algorithm name, the hash value (or "-" if empty), and a copy button to copy that specific hash.

3

Bottom controls

At the bottom of the tool:
Auto-generate checkbox (left) - enables live hashing as you type
GENERATE button (center) - manually trigger hash generation
Input size indicator (right) - shows "0 B INPUT" or the size of your input

4

Header action buttons

In the Input text section header (top right):
Paste button - paste text from clipboard
Export button (download icon) - opens Export results modal
Clear button (trash icon) - remove all input

5

Favorites tab

On the left sidebar (desktop) or bottom bar (mobile), a heart icon lets you add this tool to your favorites for quick access from the Command palette.

Hash Generator interface showing input drop zone, hash output grid, bottom controls, and header buttons
Complete interface with input section, hash cards, and controls

Input area Text & Files

The input area accepts both text input and file drops. It's where you provide the data to be hashed.

1

Section header

The header shows Input text with a keyboard icon on the left. On the right side are three action buttons:
Paste: paste text from clipboard
Download: opens Export results modal
Clear: remove all input

2

Drop zone

The large input area displays:
Upload icon
Drop files here or start typing: the placeholder text
TXT badge: indicates the supported file type

You can either type directly into this area or drag and drop a file.

3

Text input

Click inside the drop zone and start typing or paste text. As you type (with Auto-generate enabled), all 12 hash values update in real-time. This is the fastest way to hash short strings.

4

File input

Drag and drop a .txt file onto the drop zone. The file's contents will be read and hashed. Files are processed entirely in your browser: nothing is uploaded to any server. Only plain text files (.txt) are supported for file input.

Input area with drop zone showing upload icon, placeholder text, and TXT badge
Input area for text entry or file drop
File privacy
Your files never leave your device. All hashing is performed locally using your browser's built-in cryptographic APIs. No data is sent to any server.

12 hash algorithms Complete List

The hash generator supports 12 different algorithms displayed in a 2-column grid. Here's what each algorithm offers:

1

SHA-256 (Row 1, Left)

Secure Hash Algorithm 256-bit: The current industry standard. Produces a 64-character hex string (256 bits). Used in SSL certificates, Bitcoin, file verification, and most modern security applications. Recommended for most uses.

2

SHA-512 (Row 1, Right)

Secure Hash Algorithm 512-bit: Produces a 128-character hex string (512 bits). From the same SHA-2 family as SHA-256 but with longer output. Use when you need an extra security margin.

3

SHA-1 (Row 2, Left)

Secure Hash Algorithm 1: Legacy algorithm producing 40 characters (160 bits).
Deprecated for security: collisions have been demonstrated. Still used in some older systems (Git commits). Avoid for new security applications.

4

MD5 (Row 2, Right)

Message Digest 5: Fast algorithm producing 32 characters (128 bits).
Cryptographically broken: collisions can be created. Fine for checksums and quick file verification, but NOT for security purposes.

5

SHA-384 (Row 3, Left)

Secure Hash Algorithm 384-bit: Part of SHA-2 family. Produces 96 characters. A truncated version of SHA-512, offering a middle ground between SHA-256 and SHA-512.

6

SHA-224 (Row 3, Right)

Secure Hash Algorithm 224-bit: Part of SHA-2 family. Produces 56 characters. A truncated version of SHA-256 for applications needing shorter hashes.

7

SHA3-256 (Row 4, Left)

SHA-3 256-bit: The newest standard (Keccak algorithm). Different internal design from SHA-2. Produces 64 characters. Use for defense in depth or when SHA-2 compatibility isn't required.

8

SHA3-512 (Row 4, Right)

SHA-3 512-bit: SHA-3 family with maximum output. Produces 128 characters. The most secure option when you need cutting-edge algorithms.

9

SHA3-384 (Row 5, Left)

SHA-3 384-bit: SHA-3 family producing 96 characters. Offers a balance between SHA3-256 and SHA3-512.

10

SHA3-224 (Row 5, Right)

SHA-3 224-bit: SHA-3 family with shorter output. Produces 56 characters. For applications needing compact SHA-3 hashes.

11

BLAKE2B (Row 6, Left)

BLAKE2b: A modern, fast hash algorithm. Produces up to 128 characters. Faster than MD5 while being secure. Used in many modern applications, including password hashing libraries.

12

CRC32 (Row 6, Right)

Cyclic Redundancy Check 32-bit: Produces only 8 characters.
Not cryptographic: designed for error detection, not security. Used in ZIP files, network packets, and data integrity checks where speed matters more than security.

Hash output cards Results

Each hash algorithm has its own output card displaying the result. All 12 cards update simultaneously when you input data.

1

Card layout

Each card contains three elements:
Algorithm name (left) - e.g., "SHA-256", "MD5"
Hash value (center) - the generated hash or "-" if empty
Copy button (right) - orange button to copy that specific hash

2

Empty state

When no input is provided, all hash fields show a dash ("-") placeholder. This indicates no hash has been generated yet.

3

Hash display

Once you provide input, each card shows the full hash value in the center field. Hashes are displayed in lowercase hexadecimal format. Long hashes may be truncated visually but the full value is stored.

4

Copy individual hash

Click the orange copy button on any card to copy that specific hash to your clipboard. A notification confirms the copy. This is useful when you only need one particular algorithm.

5

Grid arrangement

Cards are arranged in a 2-column grid with 6 rows:
Row 1: SHA-256, SHA-512
Row 2: SHA-1, MD5
Row 3: SHA-384, SHA-224
Row 4: SHA3-256, SHA3-512
Row 5: SHA3-384, SHA3-224
Row 6: BLAKE2B, CRC32

Auto-generate & Generate Controls

The bottom of the tool contains controls for hash generation. You can either auto-generate as you type or manually trigger generation.

1

Auto-generate checkbox

Auto-generate (checked by default):
When enabled: hashes update instantly as you type
Every keystroke triggers recalculation of all 12 hashes
Perfect for interactive exploration and short inputs
May cause lag for very large inputs - disable if needed

2

GENERATE button

The orange GENERATE button (with fingerprint icon) in the center:
Click to manually calculate all hashes
Useful when Auto-generate is disabled
Also useful after dropping a large file
All 12 hashes are calculated simultaneously

3

Input size indicator

The orange badge on the right shows your input size:
"0 B INPUT": no input provided
"256 B INPUT": 256 bytes of text
"1.5 MB INPUT": for larger file inputs

This helps you understand the data being hashed.

4

When to disable Auto-generate

Consider disabling Auto-generate when:
Processing very large files (reduces CPU load)
Typing long text that shouldn't be hashed mid-entry
You want more control over when hashing occurs

With Auto-generate off, use the GENERATE button to hash on demand.

Bottom controls with Auto-generate checkbox, GENERATE button, and input size indicator
Bottom controls for hash generation

Export results Download & Copy

Click the Download button in the input section header to open the Export results modal. This lets you save or copy all hash values at once.

1

Open the modal

Click the download icon (arrow pointing down) in the Input text section header. The Export results modal opens with export options.

2

Modal header

The modal shows Export results with a download icon. An X button in the top right closes the modal without exporting.

3

Export as file

The Export as file section offers three format buttons:
TXT: Plain text format, one hash per line
CSV: Comma-separated values for spreadsheets
JSON: Structured data format for developers

Click any button to download the file immediately.

4

Copy to clipboard

The Copy to clipboard section has one button:
COPY ALL HASHES (orange button with copy icon)
Copies all 12 hash values to your clipboard at once
Useful for pasting into documents or sharing

Export results modal with TXT, CSV, JSON buttons and COPY ALL HASHES option
Export results modal with file formats and clipboard copy
5

Export formats explained

TXT format: SHA-256: abc123... SHA-512: def456...
CSV format: Algorithm,Hash SHA-256,abc123... SHA-512,def456...
JSON format: {"SHA-256": "abc123...", "SHA-512": "def456..."}

Quick copy tip
Need just one hash? Click the copy button on that specific card instead of opening the export modal. The modal is best when you need all 12 hashes at once.

Understanding hashes Concepts

A hash is a fixed-length "fingerprint" produced by running data through a hash function. Understanding how hashes work helps you use them effectively.

1

One-way function

Hash functions are one-way: easy to compute a hash from data, practically impossible to reverse (get data from hash). You can't "decrypt" a hash - it's not encryption.

2

Fixed output length

Regardless of input size - 1 byte or 1 gigabyte - the hash is always the same length. SHA-256 always produces 64 hex characters (256 bits), whether you hash "hi" or a 4K movie.

3

Deterministic

The same input always produces the same hash. This enables verification: if two hashes match, the data matches. Hash "hello" today and tomorrow - you'll get identical results.

4

Avalanche effect

A tiny change in input dramatically changes the output. "hello" and "Hello" produce completely different hashes. Change one bit, and about half the hash bits flip. This catches even minor tampering.

5

Collision resistance

Good hash algorithms make it extremely hard to find two different inputs that produce the same hash (a "collision"). MD5 and SHA-1 have known collisions; SHA-256 and SHA-3 do not.

Hash example - avalanche effect
Input:  "hello"
SHA-256: 2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824

Input:  "Hello" (capital H - one bit changed!)
SHA-256: 185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969

Completely different outputs from a tiny change!

Tips & best practices

Use SHA-256 for security
When security matters, always use SHA-256 or better. It's the current industry standard with no known practical attacks.
MD5/CRC32 for speed
For quick checksums where security isn't critical (like verifying a local backup), MD5 or CRC32 are faster and sufficient.
Auto-generate for exploration
Keep Auto-generate enabled when testing short strings. Watch how hashes change with every keystroke - great for learning!
Large files - disable auto
When hashing large files, consider disabling Auto-generate to prevent unnecessary recalculations. Drop the file, then click GENERATE.
Verify downloaded files
Software sites often provide SHA-256 hashes. After downloading, drop the file here and compare hashes. If they match, your download is intact.
Export for documentation
Use JSON export when documenting file hashes for software releases. Use CSV for spreadsheet tracking of multiple files.
SHA-3 for future-proofing
SHA-3 uses a completely different algorithm than SHA-2. For maximum security or when regulations require it, consider SHA3-256.
BLAKE2B for performance
BLAKE2B is faster than MD5 while being secure. If you need speed AND security (like hashing many files), BLAKE2B is excellent.

Frequently asked questions

No. Hashes are one-way by design. You cannot mathematically reverse them. Attackers use lookup tables (rainbow tables) or brute force for short/common inputs, but this isn't reversal - it's guessing inputs until one matches.
Different algorithms serve different purposes. SHA-256 for security, MD5/CRC32 for quick checksums, SHA-3 for cutting-edge needs, BLAKE2B for speed+security. Having all 12 at once lets you choose the right one for your use case.
MD5 is cryptographically broken - attackers can create different files with the same hash (collisions). SHA-256 has no known practical attacks. For any security purpose, always prefer SHA-256 or better.
No. All hashing happens entirely in your browser using JavaScript cryptographic APIs. Your files and text never leave your device. This is why it works offline too.
Check: 1) Same algorithm? 2) Same input (watch for invisible trailing spaces/newlines)? 3) Same encoding (UTF-8 vs ASCII)? 4) Text vs file mode? For files, ensure the complete file was processed.
SHA-2 (SHA-256, SHA-512) and SHA-3 (SHA3-256, SHA3-512) produce similar-length outputs but use completely different internal algorithms. SHA-3 was designed as a backup in case SHA-2 is ever compromised. Both are currently secure.
CRC32 is a fast checksum for detecting accidental data corruption - not for security. It's used in ZIP files, Ethernet packets, and anywhere quick error detection is needed. Don't use it when security matters.
BLAKE2B was designed to be faster than MD5 while maintaining cryptographic security. It's used in modern applications like libsodium, WireGuard VPN, and password hashing. It's a great choice when you need both speed and security.
You can, but you shouldn't. For password storage, use specialized algorithms like bcrypt, scrypt, or Argon2 that include salting and are intentionally slow. Plain SHA-256 passwords can be attacked with rainbow tables.
Hash the first file, copy the SHA-256 value. Hash the second file, compare. If the SHA-256 hashes match exactly, the files are identical. Use COPY ALL HASHES if you want to compare multiple algorithms at once.

Ready to hash?

Generate cryptographic hashes for your files and text with 12 algorithms.

Open Hash Generator

Documentation