Hash Generator
Generate MD5, SHA-1, SHA-256, SHA-512 hashes from text or files. Browser-side, no upload.
Generate MD5, SHA-1, SHA-256, SHA-512 hashes from text or files. Web Crypto API, browser-side.
Hash Generator computes cryptographic hashes — used for file integrity verification, password hashing (with proper salt), data deduplication, and content-addressable storage like Git's SHA-1.
Pickrack uses the Web Crypto API (crypto.subtle.digest) — the same primitive that powers TLS, SSH, and disk encryption. SHA-1, SHA-256, and SHA-512 are computed natively. MD5 is provided via a small JavaScript implementation for legacy compatibility (don't use MD5 for security — only for non-cryptographic checksums).
Free, no signup. Text mode for instant strings. File mode for files up to 100MB — useful for verifying downloads against published checksums.
Key features
- Four algorithms — MD5, SHA-1, SHA-256, SHA-512. All computed on every input — copy whichever you need.
- Text and file modes — Paste text (UTF-8) or drop a file (up to 100MB). Files are read in chunks to avoid memory spikes.
- Browser-side privacy — Web Crypto API runs locally. Files stay in browser memory; nothing uploads. Even sensitive content (private keys, credentials) is safe.
- Live hashing as you type — Text mode updates hashes on every keystroke (debounced). Useful for testing exact-match scenarios.
- Hex output, copy-to-clipboard — All hashes shown as lowercase hex. Click copy on any algorithm.
How to use
- Step 1: Paste text or drop a file — Text mode for strings, File mode for downloaded files (verify integrity).
- Step 2: Read the four hashes — MD5, SHA-1, SHA-256, SHA-512 all displayed simultaneously.
- Step 3: Copy or compare — Compare against the published hash from a download page, GitHub release, or git log.
When to use
- Verify a downloaded file matches the publisher's checksum (e.g., Linux ISO downloads)
- Compute Git-style SHA-1 of a file to find it in object storage
- Generate content-addressable IDs (SHA-256 of a JSON payload as a unique key)
- Check password hash format for legacy systems still using MD5/SHA-1 (security audit context)
- Compute Docker image digest SHA-256 manually for verification
- Generate stable test fixtures by hashing input as a deterministic identifier
Frequently asked questions
Is my file uploaded?
No. Web Crypto API runs in your browser. File mode reads via FileReader in chunks; bytes never leave your tab. Verify in DevTools → Network.
Why MD5 if it's broken?
MD5 is broken for cryptographic purposes (collision attacks since 2004) but still common for non-security uses: deduplication, change detection, legacy software compatibility. Pickrack provides it labeled — you decide if it's appropriate.
Why is SHA-1 still here?
SHA-1 is theoretically broken (Google demonstrated a collision in 2017) but still used by Git for content addressing and some legacy systems. Pickrack provides it for those cases. For new security work, use SHA-256 or SHA-512.
Are these hashes secure for password storage?
NO. Plain MD5/SHA-1/SHA-256/SHA-512 are NOT for password storage. Use bcrypt, scrypt, or Argon2 with salt. Pickrack does not provide those — install bcryptjs or argon2-browser in your code.
Can I hash large files like ISOs or video?
100MB practical limit in the browser. Beyond that, browsers may run out of memory. Files larger than 100MB should be hashed with a desktop tool (sha256sum on Linux, certUtil on Windows, Get-FileHash in PowerShell).
Why do my hashes differ from another tool?
Common cause: line-ending differences (\n vs \r\n), trailing whitespace, BOM markers. Pickrack hashes the bytes you paste verbatim. Match line-endings between source and Pickrack input for exact comparison.
What about SHA-3 / Keccak?
Web Crypto API supports SHA-256/384/512 but not SHA-3. For SHA-3, use a JavaScript library like js-sha3. Pickrack may add it later.
Can I verify a Bitcoin transaction hash?
Bitcoin uses double SHA-256 (SHA-256 of SHA-256). To replicate, hash with SHA-256, then hash the result again. v2 of Pickrack may add a 'double SHA-256' option.
Related tools
UUID Generator
Generate cryptographic UUID v4 single or in bulk (1-1000). One-click copy. Browser crypto.randomUUID.
Base64 Encoder
Encode and decode Base64 strings. Supports text and file modes. Browser-side, instant.
Password Generator
Generate cryptographically strong passwords. Length, symbols, numbers, exclude similar — all configurable.