Tools
Hash Generator
Generate SHA-1, SHA-256, SHA-384, and SHA-512 cryptographic hashes from any text. Uses the browser's Web Crypto API — your input never leaves your device.
FreeSHA-256 / SHA-512Web Crypto API
Enter Text to Hash
Common uses for hash functions
- Verifying file integrity (compare hash before and after download).
- Storing passwords securely (hash + salt, never plain text).
- Digital signatures and certificates.
- Git commit hashes (Git uses SHA-1).
- Generating unique identifiers from content.
Hash algorithm comparison
- SHA-1: 160-bit hash, deprecated for security (still used for checksums)
- SHA-256: 256-bit hash, current industry standard
- SHA-384: 384-bit hash, higher security margin
- SHA-512: 512-bit hash, maximum security in SHA-2 family