Calculate MD5, SHA-1, and SHA-256 cryptographic hashes for text or files. All calculations are performed locally in your browser.
Drag and drop a file here, or click to browse
Select FileCryptographic hash functions create a unique "fingerprint" of data. Even a small change in the input produces a completely different hash. In digital forensics, hashes are used to verify evidence integrity - if the hash matches, the data has not been modified.