Hash Generator/Verifier (MD5 / SHA / HMAC)
Hash text/files (MD5/SHA), HMAC (SHA), and verify matches
How to Use
- Choose text or file
Use the toolbar to switch between text and file input, and pick a file if needed.
- Pick options and run
Select algorithms and output format (HEX/Base64). Optionally set HMAC key and an expected hash to verify. Then click "Convert".
- Copy result
Use the "Copy" button to copy the results to your clipboard.
Hash Generator/Verifier (MD5 / SHA / HMAC) Examples
SHA-256 (hello)
hello2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824Select “SHA-256” and “HEX” in the toolbar.
HMAC-SHA-256 (key=secret, msg=hello)
message: hello
key: secret88aab3ede8d3adf94d26ab90d3bafd4a2083070c3bcce9c014ee04a443847c0bEnable HMAC in the toolbar and set the key.
MD5 (hello)
hello5d41402abc4b2a76b9719d911017c592MD5 is not recommended for security due to known collisions.
Features
- Hash text and files (MD5/SHA-1/SHA-256/SHA-512)
- HMAC (SHA family) support
- HEX/Base64 output + expected-hash verification
- Local processing (your input is not sent to servers)
- Mobile-friendly responsive design
- Dark mode support
FAQ
What is a hash function?
A hash function converts arbitrary-length data into a fixed-length value (hash). The same input always produces the same hash, but you cannot reverse-engineer the original data from the hash.
What is the difference between MD5 and SHA-256?
MD5 produces a 128-bit hash but has known collision vulnerabilities, so it is not recommended for security purposes. SHA-256 produces a 256-bit hash and is still considered secure. Use SHA-256 or higher for file integrity checks and cryptographic purposes.
Is my data sent to a server?
No. All hash computation happens locally in your browser using the Web Crypto API. No data is ever transmitted externally.