security tools/encryption/Hash Generator

Hash Generator

Generate various types of cryptographic hashes for security analysis

security tools
Risk: Low
MD5, SHA1, SHA256
File Hashing
Batch Processing
Hash Comparison
#hash
#crypto
#md5
#sha
#encryption
Cryptographic Hash & Encoding Tool
Generate hashes, checksums, and encodings for text or files
🔢 Encodings & Representations
🔐 Hash Functions
✅ Checksums & Lightweight Hashes
💾 Password Hashing & KDFs
Select All
SHA-1
SHA-224
SHA-256
SHA-384
SHA-512
SHA3-224
SHA3-256
SHA3-384
SHA3-512
SHAKE128
SHAKE256
MD2
MD4
MD5
BLAKE
BLAKE2b
BLAKE2s
BLAKE3
Whirlpool
RIPEMD-128
RIPEMD-160
RIPEMD-256
RIPEMD-320
Tiger
Tiger2
HAVAL-128
HAVAL-160
HAVAL-192
HAVAL-224
HAVAL-256
GOST R 34.11-94
Streebog
Snefru
Panama
LSH
SM3
Keccak
RadioGatun
Results
Results will appear here
Hash & Encoding Information

Encodings transform data into different representations without encryption. They're used for data transmission, storage, or compatibility purposes.

Hash functions create fixed-length outputs from arbitrary inputs. They are one-way functions designed for data integrity verification.

Checksums are lightweight algorithms used to detect accidental changes to data.

Password hashing functions are specialized hash functions designed to be computationally intensive and resistant to various attack methods.

Implementation Note:

This tool uses the following implementations:

  • Web Crypto API: SHA-1, SHA-256, SHA-384, and SHA-512 hashing (browser native)
  • hash-wasm: High-performance WebAssembly implementations of many algorithms (BLAKE2/3, Whirlpool, etc.)
  • js-sha3: Specialized SHA3, Keccak, and SHAKE implementations
  • crypto-js: Additional algorithms and fallbacks
  • Server API: Password hashing (Argon2, bcrypt, scrypt, PBKDF2) runs securely on the server
  • Pure JavaScript: MD5 and SHA3-256 implementations (as fallback)
  • Comprehensive Encodings: 25+ encodings including Base16/32/36/58/62/85, UTF-7/8/16/32, UCS-2/4, Morse Code, HTML Entity, and more

Password hashing algorithms are executed via a secure server-side API for better security and compatibility.

For secure applications, always use current best practices:

  • Avoid MD5 and SHA-1 for security-critical applications
  • Use SHA-256 or SHA-3 for general cryptographic use
  • For password storage, prefer Argon2, bcrypt, or PBKDF2
Security Notice

This tool is for educational purposes only. Many of the listed algorithms are not suitable for production security use. Always use current best practices for sensitive applications.

  • MD5, SHA-1, and other older hashes are considered cryptographically broken
  • For password storage, use specialized algorithms like Argon2, bcrypt, or PBKDF2
  • For general cryptographic use, prefer SHA-256 or newer
Authorization Required

Only use this tool on systems you own or have explicit written permission to test. Unauthorized scanning or testing is illegal and may result in criminal charges.