Developer Tools
Hash Generator
Generate SHA-256, SHA-384, SHA-512, and SHA-1 hashes from any text. Uses the browser's native Web Crypto API — your data never leaves your device.
1 line • 13 chars
Paste text, keep line numbers visible, and generate or copy hashes without leaving fullscreen mode.
Quick examples
Usage notes
- SHA-256 is the most commonly used hash for integrity checks and digital signatures.
- SHA-1 is considered weak for security but still used for non-cryptographic checksums (e.g., Git).
- Hashing is one-way — you cannot reverse a hash back to the original text.
How to Use This Tool
- 1Enter or paste text into the input field.
- 2Click 'Generate Hashes' to compute all hash algorithms at once.
- 3Click the copy button next to any hash to copy it.
Frequently Asked Questions
- Is my data sent to a server?
- No. All hashing is done locally in your browser using the Web Crypto API. Your text never leaves your device.
- What is the difference between SHA-256 and SHA-512?
- SHA-256 produces a 256-bit (64 hex chars) hash, SHA-512 produces a 512-bit (128 hex chars) hash. SHA-512 is more resistant to brute force but both are considered secure.
- Why is SHA-1 included if it's weak?
- SHA-1 is still widely used in non-security contexts like Git commit hashes and file integrity checks. It should not be used for passwords or digital signatures.
- Can I hash files?
- This tool hashes text input only. For file hashing, you would need to read the file as bytes first.