Generate hashes (MD5, SHA-1, SHA-256)
Hash Generator creates cryptographic hashes from text and files using MD5, SHA-1, SHA-256, SHA-384, and SHA-512 algorithms. A hash function converts data of arbitrary length into a fixed-length string. Hashes are used for data integrity verification (checksums), verifying downloaded files, password storage (with salt), creating unique identifiers, and digital signatures. File support is especially important for verifying checksums of firmware, software, and ISO images.
A hash function is a mathematical function that converts data of arbitrary size into a fixed-length string. Key properties: the same input data always produces the same hash, the slightest change in input data completely changes the hash, and it is impossible to recover original data from the hash. MD5 and SHA-1 are considered outdated for cryptography, but SHA-256 is widely used and considered secure.
Encode and decode Base64
Decode JWT tokens
Convert text case (Upper, Lower, CamelCase, snake_case)
Compare two texts for differences
Count characters and words
Generate placeholder text
Test regular expressions
Generate secure passwords
Encode and decode URL
Generate UUID v4
Convert colors and pick colors
Convert between CSV, JSON and XML formats
Format and validate JSON, XML, CSV
Encode and decode HTML entities
Convert Unix timestamp to date and vice versa
Convert data units (bits, bytes, kilobytes, megabytes, etc.)
Convert between binary, octal, decimal, and hexadecimal number systems
Generate and parse cron expressions for task scheduling
Subnet calculator for calculating network parameters
Generate website icons in different sizes from uploaded image