Vulnsy
Back to Free Tools

Hash Generator & Identifier

Cryptographic hashes are one-way fingerprints of input data, used to verify file integrity, store passwords, and compare data without revealing it. This tool computes MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes for any text input via the browser's Web Crypto API, or — given an unknown hash — identifies the likely algorithm based on length and character set (32 hex characters → MD5; 64 hex → SHA-256; 128 hex → SHA-512).

MD5 and SHA-1 are cryptographically broken and shouldn't be used in new security designs, but the tool still exposes them because hash identification, CTF challenges, and legacy-system audits still require recognising them.

Enter text and click Generate to see hashes

Features

Multiple Algorithms

Generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes from any text input.

Hash Identification

Paste an unknown hash and identify possible algorithms based on length and pattern matching.

Copy & Compare

One-click copy for any generated hash. All processing done locally in your browser.