Hash Generator/Verifier (MD5 / SHA / HMAC)

Hash text/files (MD5/SHA), HMAC (SHA), and verify matches

100% In-BrowserNo Server UploadFree, No Signup
Security
For EngineersFastPass - AI Career Agent

AI analyzes your skills and matches you with the best opportunities. Get a free market value assessment.

Get Started Free

How to Use

  1. Choose text or file

    Use the toolbar to switch between text and file input, and pick a file if needed.

  2. Pick options and run

    Select algorithms and output format (HEX/Base64). Optionally set HMAC key and an expected hash to verify. Then click "Convert".

  3. Copy result

    Use the "Copy" button to copy the results to your clipboard.

Hash Generator/Verifier (MD5 / SHA / HMAC) Examples

SHA-256 (hello)

Input
hello
Output
2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824

Select “SHA-256” and “HEX” in the toolbar.

HMAC-SHA-256 (key=secret, msg=hello)

Input
message: hello
key: secret
Output
88aab3ede8d3adf94d26ab90d3bafd4a2083070c3bcce9c014ee04a443847c0b

Enable HMAC in the toolbar and set the key.

MD5 (hello)

Input
hello
Output
5d41402abc4b2a76b9719d911017c592

MD5 is not recommended for security due to known collisions.

Features

  • Hash text and files (MD5/SHA-1/SHA-256/SHA-512)
  • HMAC (SHA family) support
  • HEX/Base64 output + expected-hash verification
  • Local processing (your input is not sent to servers)
  • Mobile-friendly responsive design
  • Dark mode support

FAQ

What is a hash function?

A hash function converts arbitrary-length data into a fixed-length value (hash). The same input always produces the same hash, but you cannot reverse-engineer the original data from the hash.

What is the difference between MD5 and SHA-256?

MD5 produces a 128-bit hash but has known collision vulnerabilities, so it is not recommended for security purposes. SHA-256 produces a 256-bit hash and is still considered secure. Use SHA-256 or higher for file integrity checks and cryptographic purposes.

Is my data sent to a server?

No. All hash computation happens locally in your browser using the Web Crypto API. No data is ever transmitted externally.