← Back to Tools

#️⃣ Hash Generator & Identifier

Generate cryptographic hashes or identify an unknown hash's algorithm.

Input is never stored or logged.

📚 Hash functions — what they are and why they matter

A cryptographic hash function takes any input and produces a fixed-length digest. The same input always produces the same output, but you cannot reverse the process — you can't recover the input from the hash alone.

MD5 and SHA-1 are broken — researchers have found collisions (two different inputs that produce the same hash). Never use them for security purposes like password storage or digital signatures. SHA-256+ is recommended.

Password hashing: Passwords should be hashed with bcrypt, Argon2, or scrypt — not raw SHA-256. These algorithms are deliberately slow and include salting to prevent rainbow table attacks.