Navigation

Hash Generator

Compute MD5, SHA-1, SHA-256, and SHA-512 hashes from text or files. Everything runs in your browser — no data is uploaded.

Input mode
Algorithms
Input
0 chars

Type or paste text to generate hashes.

Hashes

Each hash is displayed with a copy button and a link to search it on mlab.

Results will appear here...
Related tools
How to use
1
Choose mode

Text input for strings, File input for documents and binaries.

2
Provide input

Type text or drop a file. Select which algorithms to use.

3
Generate

Click the button. All selected hashes are computed instantly.

4
Copy or search

Copy individual hashes or search them on mlab for threat intel.

Frequently Asked Questions

A cryptographic hash function takes an input of any size and produces a fixed-size digest. It is deterministic, one-way, and collision-resistant. Hash functions are used for file integrity verification, password storage, digital signatures, and malware identification.

SHA-256 is the recommended default. MD5 and SHA-1 are considered broken and should only be used for non-security purposes like checksums. In malware analysis, MD5 and SHA-256 are both commonly used as file identifiers across threat intelligence platforms.

Yes! After generating a hash, click "Search on mlab" to look it up in our threat intelligence database. Mlab aggregates data from multiple sources to tell you if a file hash is associated with known malware.