Hash Generator

Compute cryptographic hashes using MD5, SHA-1, SHA-256, or SHA-512. Output as hexadecimal or Base64.

About Hash Functions
MD5
128-bit hash. Fast but not suitable for security-sensitive use — collisions are feasible.
SHA-1
160-bit hash. Deprecated for cryptographic use; attacks are known but uncommon in practice.
SHA-256
256-bit hash from the SHA-2 family. The go-to choice for checksum verification and digital signatures.
SHA-512
512-bit hash, higher security margin. Preferred where length-extension attacks are a concern.

Never hash passwords with these alone. Use a purpose-built algorithm like bcrypt, Argon2, or PBKDF2.