Skip to main content

Hash Generator

Generate SHA-1, SHA-256, SHA-384, and SHA-512 cryptographic hashes from any text. Uses the browser's Web Crypto API — your input never leaves your device.

FreeSHA-256 / SHA-512Web Crypto API

Enter Text to Hash

Common uses for hash functions

  • Verifying file integrity (compare hash before and after download).
  • Storing passwords securely (hash + salt, never plain text).
  • Digital signatures and certificates.
  • Git commit hashes (Git uses SHA-1).
  • Generating unique identifiers from content.

Hash algorithm comparison

  • SHA-1: 160-bit hash, deprecated for security (still used for checksums)
  • SHA-256: 256-bit hash, current industry standard
  • SHA-384: 384-bit hash, higher security margin
  • SHA-512: 512-bit hash, maximum security in SHA-2 family