Hash Generator

Compute MD5, SHA-1, SHA-256, SHA-512, SHA-3, CRC32 hashes and HMAC for text or files.

Browser Processing Only (Offline Ready)
1

Enter your text

Paste or type your content into the input field.

2

Adjust settings

Configure options to get the result you want.

3

Copy or save

Copy the output to clipboard or save it.

Key Features

8 Hash Algorithms in One Click

Compute MD5, CRC32, SHA-1, SHA-256, SHA-384, SHA-512, SHA3-256, and SHA3-512 simultaneously. All results appear instantly — no need to run each algorithm separately.

Real-Time Hashing as You Type

Results update instantly as you type with zero-delay feedback. No need to click a button — just type and see all 8 hash values computed in real time.

HMAC Authentication Support

Generate HMAC (Hash-based Message Authentication Code) with a secret key for SHA-1, SHA-256, SHA-384, and SHA-512. Supports both UTF-8 text and hex-encoded keys.

Hash Verification & Comparison

Paste an expected hash value to instantly verify it against all computed results. The tool identifies which algorithm matches and shows a clear pass/fail indicator.

Batch File Hashing with Progress

Hash multiple files at once with a visual progress indicator. Drag and drop files directly — results are displayed per file with one-click copy for each algorithm.

100% Private — Zero Server Uploads

All hashing is performed entirely in your browser using the Web Crypto API and optimized JavaScript. Your text and files never leave your device.

About This Tool

What is Hash Generator?

Hash Generator computes cryptographic hash values for text or files using MD5, SHA-1, SHA-256, SHA-384, SHA-512, SHA3-256, SHA3-512, and CRC32 algorithms. It also supports HMAC (Hash-based Message Authentication Code) with a secret key. Hashes are one-way fingerprints used to verify data integrity, compare files, and validate downloads.

Generate hashes instantly in your browser with real-time computation — ideal for verifying file integrity or creating content digests.

Common Use Cases

  • File Integrity: Verify downloaded files haven't been tampered with by comparing checksums
  • Content Deduplication: Compare hashes to find duplicate files
  • API Authentication: Generate HMAC signatures for API requests
  • Software Distribution: Generate checksums for your own file releases
  • Security Auditing: Hash files to detect unauthorized modifications

Privacy-First Hash Generation

Hashes are computed entirely in your browser using the native Web Crypto API and optimized JavaScript implementations.

  • Your text and files never leave your device — critical when hashing sensitive content
  • Uses hardware-accelerated cryptographic implementations when available
  • Works offline after the page loads

FAQ

MD5, CRC32, SHA-1, SHA-256, SHA-384, SHA-512, SHA3-256, and SHA3-512 are all computed simultaneously. SHA algorithms use the browser's Web Crypto API, while MD5, CRC32, and SHA-3 use optimized JavaScript implementations.
Yes, switch to File mode and drop any file. You can also hash multiple files at once with batch processing. The hash is computed locally in your browser — the file is never uploaded.
No. All processing happens entirely in your browser. Your data never leaves your device — nothing is uploaded to any server.
Yes. Once the page has loaded, the tool works completely offline. For the best experience, install PrivaDeck as a PWA from your browser.
There are no server-imposed limits. The maximum file size depends on your device's available memory and browser capabilities. Most modern devices handle files up to several hundred MB without issues.
MD5 is cryptographically broken and should not be used for security purposes. However, it remains widely used for checksums and file integrity verification where collision resistance is not critical.
HMAC (Hash-based Message Authentication Code) combines a hash function with a secret key to produce a message authentication code. It's used to verify both data integrity and authenticity. Switch to HMAC mode and enter your secret key to compute HMAC values.
After computing hashes, paste an expected hash value in the verification field. The tool automatically compares it against all computed hashes and shows which algorithm matches, if any. The comparison is case-insensitive.