ConvertiloConvertilo

Hash Generator Online — MD5, SHA-1, SHA-256, SHA-512

Generate MD5, SHA-1, SHA-256, SHA-384 and SHA-512 hashes from text or a file. Checksums computed in your browser, nothing is uploaded.

About Hash Generator

Compute MD5, SHA-1, SHA-256, SHA-384 and SHA-512 hashes for text or any file, right in your browser. SHA algorithms run via the Web Crypto API; MD5 uses the spark-md5 library. Files and passwords are never uploaded.

Where hashes are used

Checksum verification

Compare the MD5 or SHA-256 of a downloaded file with the value published on the official site to confirm the archive is intact and not tampered with.

Content identifiers

Use a hash as a short unique ID for content: file deduplication, cache keys, ETags, content-addressable storage.

Signatures and tokens

SHA-256 powers HMAC, JWT, digital signatures and certificates — generate the message hash to debug your APIs.

Duplicate detection

Identical MD5 or SHA-256 across two files almost certainly means identical content — handy for cleaning up duplicates.

FAQ

What is a hash and how do MD5, SHA-1, SHA-256 and SHA-512 differ?

A hash is a fixed-length string that uniquely represents input data. MD5 outputs 128 bits, SHA-1 — 160, SHA-256 — 256, SHA-512 — 512. Longer hashes mean fewer collisions but slower computation.

Is it safe to hash passwords and files here?

Yes. All hashing runs in your browser: MD5 via spark-md5, SHA-* via the Web Crypto API. Neither text nor files are sent to convertilo — we never see or store them.

Can I use MD5 for passwords?

No. MD5 is broken for password storage. Use bcrypt, Argon2 or scrypt with a salt instead. MD5 is fine for file integrity checks and quick deduplication.

What is the maximum file size?

Browser memory is the only limit. MD5 is hashed in 2 MB chunks, so multi-gigabyte files usually work. SHA-* in this version reads the file fully into memory — use MD5 for very large files.

Why do visually identical strings produce different hashes?

Hashes are byte-sensitive — a stray space, a different line ending (LF vs CRLF) or an invisible BOM at the start of a file completely changes the result. Compare byte-identical inputs.

Where do I get the reference checksum?

Distribution authors publish MD5 / SHA-256 next to the download link or in SHASUMS / .sig files. Match that value against the one shown by this generator.