Compute MD5, SHA-1, SHA-256, and SHA-512 digests for UTF-8 text or raw file bytes. SHA algorithms use the browser’s Web Crypto API; MD5 uses a small client-side implementation loaded from the CDN. Nothing is uploaded to DroidXP — the same local-only approach as our APK Analyzer and APK String Extractor.
Line endings and Unicode are encoded as UTF-8 before hashing.
No file selected
It outputs hexadecimal digests for the same input under four common algorithms. Text mode encodes your string as UTF-8 and hashes those bytes.
File mode reads the file as a raw byte array (no charset conversion). SHA-1, SHA-256, and SHA-512 use the browser’s built-in
crypto.subtle.digest. MD5 is provided by the blueimp-md5 script from jsDelivr because MD5 is not exposed by Web Crypto.
Text and files are processed with JavaScript in your browser tab. DroidXP does not receive your content for this tool. The only network request beyond the page itself is loading the MD5 script from the CDN (then cached).
No. Hashing runs in your browser. Your content is not sent to DroidXP servers for this tool.
Web Crypto does not implement MD5. The page loads the small blueimp-md5 library from jsDelivr so MD5 matches what many desktop tools produce. Self-host the script if your policy forbids third-party JavaScript.
Not for new cryptographic guarantees. MD5 collisions are practical; SHA-1 is deprecated for many uses. This tool is for checksums and compatibility, not for signing or storing secrets.
Check that both sides use the same bytes: UTF-8 text vs Latin-1, Windows vs Unix line endings, and whether a file was hashed raw or interpreted as text. This page uses UTF-8 for text and raw bytes for files.
The whole file is read into memory. Very large files may be slow or fail on low-memory devices. For multi-gigabyte files, prefer a desktop CLI or streaming hasher.
No. It only computes plain digests. For password storage use a dedicated KDF (Argon2, bcrypt, scrypt) on your server — not raw SHA or MD5.
It works in secure contexts (HTTPS or localhost). In older browsers or insecure HTTP pages, SHA functions may fail — try HTTPS or a modern browser.
Lowercase hex is widely used in APIs and docs. If you need uppercase, copy and transform in your editor — the underlying value is the same.
Yes — switch to File, select the downloaded file, and compare SHA-256 (or the algorithm the publisher specifies) to the published value.
Other software can read the clipboard on some systems. Clear sensitive inputs when done on shared computers.
The Password Generator creates random secrets. This tool fingerprints arbitrary data — different purpose; do not confuse checksums with password hashing.