FixThatAppAll Tools
Security

Hash Generator

Generate MD5, SHA-1, SHA-256 hashes from text.

How This Tool Works

The Hash Generator creates cryptographic hash digests for any text input using standard algorithms including MD5, SHA-1, SHA-256, and SHA-512. A hash function converts input of any length into a fixed-length string. The same input always produces the same hash (deterministic); changing even one character changes the entire hash (avalanche effect); and you cannot reverse a hash back to the original input (one-way). Common uses: verifying file integrity, storing passwords (use bcrypt/Argon2, not SHA), generating content fingerprints, and creating cache keys.

How to Use

  1. Enter the text you want to hash in field A.
  2. Click Run. The result shows the hash digest.
  3. To verify a download: hash the downloaded file's contents and compare to the publisher's listed hash.
  4. Important: do NOT use MD5 or SHA-1/SHA-256 for password storage — use bcrypt or Argon2 instead.

Common Questions

What algorithm should I use?

For file integrity checks: SHA-256 (widely used, strong). For checksums where speed matters: MD5 (weak cryptographically but fine for non-security uses). For passwords: bcrypt or Argon2 — never SHA-* for passwords. For digital signatures: SHA-256 or SHA-512.

Can I reverse a hash to get the original text?

No — hash functions are one-way by design. However, common inputs (like simple passwords) can be found in precomputed lookup tables (rainbow tables). This is why password hashing must use bcrypt or Argon2 with a salt.

Why does changing one character completely change the hash?

This is the avalanche effect — a deliberate property of cryptographic hash functions. It prevents attackers from making small changes and predicting the new hash.