Password Hash Generator

Generate cryptographic hashes of passwords and other strings

Your password is never sent to our servers (except for bcrypt). All other hashing is done in your browser.

Optional. When provided, computes HMAC using this as the key.

About these algorithms

Algorithm Use Case Notes
SHA-256 General purpose hashing, checksums Fast, widely supported. With a salt, produces HMAC-SHA-256. Not ideal for password storage (use bcrypt instead).
SHA-512 Higher-security checksums, message authentication With a salt, produces HMAC-SHA-512. Not the same as sha512crypt — use the sha512crypt option for /etc/shadow.
sha512crypt Linux /etc/shadow The $6$ crypt format — 5000 rounds of SHA-512 with salt. Equivalent to openssl passwd -6 or mkpasswd -m sha-512. Computed entirely in your browser.
bcrypt Password storage in applications Intentionally slow, with built-in salt. For new projects, also consider Argon2.
MD5 Legacy systems, checksums Do not use for security. Included for compatibility with older systems.

Want to learn more? Read our guide to how password hashing works -- covering the history and tradeoffs of each algorithm.