Hash Generator — SHA-1, SHA-256, SHA-384, SHA-512
Type any text below and instantly see its SHA-1, SHA-256, SHA-384 and SHA-512 hash. All four are computed in your browser using the native Web Crypto API. Your input never leaves your machine.
Type any text below and instantly see its SHA-1, SHA-256, SHA-384 and SHA-512 hash. All four are computed in your browser using the native Web Crypto API. Your input never leaves your machine.
A cryptographic hash function takes any input and produces a fixed-length output (32, 64 or 128 hex characters depending on the algorithm). Two key properties make it useful: identical inputs always produce identical outputs, and a tiny change in the input completely changes the output. Reversing a hash back to the input is computationally infeasible.
Hashes are everywhere: verifying that a downloaded file matches the publisher's checksum, indexing content in version-control systems like Git, deriving cache keys, signing JWT tokens, and storing passwords (with extra salt and slow-by-design functions like bcrypt or argon2).
No. Hashes are computed locally with the browser's Web Crypto API. Nothing leaves your machine — safe to use even with sensitive payloads.
The Web Crypto API does not implement MD5 because it is broken and should not be used in security contexts. If you need MD5 only for a non-security use case (e.g., legacy system compatibility), use a dedicated tool — adding it via WebAssembly is on the roadmap.
Currently the tool accepts only text input. File hashing via drag-and-drop is on the roadmap. As a workaround, paste the file contents (e.g., a small JSON or config file) into the input area.