Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512 and CRC32 hashes from any text input or file. Compare two values, verify data integrity and copy results to clipboard — all processing is local, nothing is ever sent to a server.
Verify if two hashes match (e.g. verify a downloaded file)
Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512 and CRC32 hashes for any text or file directly in your browser. Uses the native Web Crypto API for SHA algorithms, ensuring maximum performance and security. Essential for developers verifying data integrity and security professionals.
MD5, SHA-1, SHA-256, SHA-384, SHA-512 and CRC32 — all the most-used hashing algorithms.
Drag and drop any file to generate its hash for integrity verification.
Generate HMAC signatures using SHA-256, SHA-384 and SHA-512 with a secret key.
Paste two hashes side-by-side to instantly verify if they match.
Copy individual hashes or all results at once with a single click.
All hashing is performed locally. Your sensitive data never touches a server.
Always use SHA-256 or higher when verifying downloaded software. The official download page will list the expected hash — if your computed hash doesn't match exactly, do not install the file as it may have been tampered with.
| Algorithm | Output Length | Speed | Security Status | Use For |
|---|---|---|---|---|
| MD5 | 128 bit / 32 hex | Fastest | ❌ Broken | Checksums only |
| SHA-1 | 160 bit / 40 hex | Fast | ❌ Weak | Legacy only |
| SHA-256 | 256 bit / 64 hex | Good | ✅ Secure | General security |
| SHA-512 | 512 bit / 128 hex | Slower | ✅ Very secure | High-value data |
| CRC32 | 32 bit / 8 hex | Fastest | ⚠️ Error detection | File checksums |
| HMAC-SHA256 | 256 bit / 64 hex | Good | ✅ Secure + keyed | API auth, webhooks |