Tool Launcher

Search for a tool...

1tt.dev1tt.dev
Hash

What is a cryptographic hash?

A cryptographic hash function takes an input of any size and produces a fixed-length digest. The same input always produces the same output, but even a single-character change produces a completely different hash. Hashes are one-way — you cannot reverse a hash to recover the original input.

Supported algorithms

  • MD5 — 128-bit digest, fast but considered insecure for cryptographic purposes
  • SHA-1 — 160-bit digest, deprecated for security but still used for checksums
  • SHA-256 — 256-bit digest, part of the SHA-2 family, widely used and recommended
  • SHA-384 — 384-bit truncated variant of SHA-512
  • SHA-512 — 512-bit digest, strongest option in the SHA-2 family

How to use this tool

  • Type or paste text to compute all hash algorithms at once
  • Drop or select a file to compute its hash digests
  • Copy any hash value with one click

Common use cases

  • Verifying file integrity after downloads using SHA-256 checksums
  • Computing content hashes for cache busting or deduplication
  • Checking Subresource Integrity (SRI) hashes for CDN scripts
  • Comparing hashes to detect file tampering