Hash Generator
Generate SHA-256, SHA-384, SHA-512, and SHA-1 hashes from any text. Uses the Web Crypto API — nothing leaves your browser.
Common use cases
Cryptographic hash functions turn any input into a fixed-length fingerprint — ideal for integrity checks and deduplication.
Verify file integrity
Hash a known string to compare against a published checksum and confirm data has not been tampered with.
Generate content fingerprints
Create a unique hash for text content to use as a cache key or deduplication identifier.
Learn about hash algorithms
Experiment with different SHA variants to understand output lengths and how small input changes produce completely different hashes.
Frequently asked questions
Short answers to the questions people usually have before using the tool.
Does this hash tool send my data to a server?+
No. Hashing uses the Web Crypto API built into your browser, so your input text never leaves your device.
Which algorithm should I choose?+
SHA-256 is the most widely used for checksums and integrity verification. SHA-512 offers a longer output. Avoid SHA-1 for security-critical work as it is considered weak.
Can I hash a file instead of text?+
This tool hashes text input only. For file hashing, use a command-line tool like shasum or a dedicated file hash utility.
Related tools
Keep moving through related utility tasks without leaving the toolbox.
Decode JWT headers and payload claims instantly in your browser.
Create secure random passwords with custom length and character groups.
Generate random UUIDs (v4) with one click. Bulk generation supported.
Convert text into uppercase, lowercase, camelCase, snake_case, and more.