SecurityBuilt with Hercules
Hash Generator
About Hash Generator
Hashes turn any input into a fixed-size fingerprint. They're used for file integrity, content addressing, and password storage (with a salt).
MD5 and SHA-1 are still useful for non-security checksums but should never be used for passwords or signatures.
Frequently asked questions
- Why are MD5 and SHA-1 marked as legacy?
- Both have practical collision attacks. They're fine for checksums of trusted content, but never for security-critical use.