Hash Generator
Hashes are computed in your browser via the Web Crypto API where supported.
Understanding hash functions
One-way fingerprints
A hash function maps input of any size to a fixed-length string. Small changes in input produce completely different hashes — useful for checksums and integrity verification.
Do not use MD5 for passwords
Modern applications should use bcrypt, Argon2, or scrypt for password storage. MD5 and SHA-1 are deprecated for security-sensitive use cases.
More tutorials: Toolsminer Guides