Developer Tools

Hash Generator

Generate SHA-256, SHA-384, SHA-512, and SHA-1 hashes from any text. Uses the browser's native Web Crypto API — your data never leaves your device.

Share:
1 line • 13 chars

Paste text, keep line numbers visible, and generate or copy hashes without leaving fullscreen mode.

Quick examples

Usage notes

  • SHA-256 is the most commonly used hash for integrity checks and digital signatures.
  • SHA-1 is considered weak for security but still used for non-cryptographic checksums (e.g., Git).
  • Hashing is one-way — you cannot reverse a hash back to the original text.

How to Use This Tool

  1. 1Enter or paste text into the input field.
  2. 2Click 'Generate Hashes' to compute all hash algorithms at once.
  3. 3Click the copy button next to any hash to copy it.

Frequently Asked Questions

Is my data sent to a server?
No. All hashing is done locally in your browser using the Web Crypto API. Your text never leaves your device.
What is the difference between SHA-256 and SHA-512?
SHA-256 produces a 256-bit (64 hex chars) hash, SHA-512 produces a 512-bit (128 hex chars) hash. SHA-512 is more resistant to brute force but both are considered secure.
Why is SHA-1 included if it's weak?
SHA-1 is still widely used in non-security contexts like Git commit hashes and file integrity checks. It should not be used for passwords or digital signatures.
Can I hash files?
This tool hashes text input only. For file hashing, you would need to read the file as bytes first.