UtiLive.dev

Fast, privacy-friendly developer utilities

UtiLive.dev

  • All Tools
    • JSON
    • JSON Schema Validator
    • JSONPath Runner
    • JSON <> YAML
    • JSON Escape / Unescape
    • JSON Diff
    • CSV <> JSON
    • CSV Toolkit
    • Text Diff
    • String Tools
    • Text Counter
    • Escape / Unescape
    • Slug Generator
    • Lorem Ipsum
    • List Comparer
    • List Delimiter
    • List → Array
    • List → JSON Array
    • Delimiter & Formatter
    • Code Formatter
    • HTML Formatter / Minifier
    • SQL Formatter
    • Markdown Preview
    • Markdown Exporter
    • UUID
    • UUID Inspector
    • cUID Generator
    • Random String
    • Password Generator
    • Secret Key
    • User-Agent
    • Base64 Text
    • Base64 Image
    • URL Encoder / Decoder
    • Hash (MD5/SHA*)
    • JWT Debugger
    • HMAC & AES
    • Bcrypt
    • Number Base Converter
    • Unit Converter
    • Date/Time Toolkit
    • Timestamp Converter
    • Color Tools
    • QR Code
    • Cron Parser
    • Regex Tester
    • Regex Library
    • WHOIS Lookup
    • DNS Lookup
    • Image Tools
    • Support
AboutPrivacy
© UtiLive.dev • Developer tools, dev swiss army knife

Hash Generator (MD5 / SHA*)

Compute MD5, SHA1, SHA256, or SHA512 digests in hex or Base64.

Features

  • • Multiple Algorithms: MD5, SHA1, SHA256, and SHA512 support
  • • Dual Encoding: Output in hexadecimal or Base64 format
  • • Real-time Hashing: Instant hash computation as you type
  • • Copy to Clipboard: Easy copying of generated hashes
  • • Unicode Support: Handles international characters

Algorithm Information

MD5
128-bit hash function (deprecated for security)
Cryptographically broken
SHA1
160-bit hash function (deprecated for security)
Cryptographically broken
SHA256
256-bit hash function (recommended)
Cryptographically secure
SHA512
512-bit hash function (highest security)
Cryptographically secure

Quick Examples

Hash Generator

1
2
3
4
5
6
7
8
9
10
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Common Use Cases

  • • Password Hashing: Store password hashes instead of plain text
  • • File Integrity: Verify files haven't been tampered with
  • • Digital Signatures: Create and verify digital signatures
  • • Data Deduplication: Identify duplicate files or data
  • • Blockchain: Create cryptographic links between blocks