Hash Generator

SHA-256, SHA-512, SHA-1 & more

If you're looking to encrypt/decrypt text with a password, try our Encrypt/Decrypt Text.

If you're looking to encode or decode in Base64, try our Base64 Encoder / Decoder.

Input
SHA-256 hash

-

How it works

Hashes are computed using the browser's built-in crypto.subtle.digest() Web Crypto API, and no data is sent to the server. All processing happens locally on your device.

Hash types

  • SHA-256
    256-bit hash. Most widely used for checksums, digital signatures, and data integrity. Part of the SHA-2 family.
  • SHA-512
    512-bit hash. Longer and more secure than SHA-256. Better for high-security applications.
  • SHA-384
    384-bit hash. Middle ground between SHA-256 and SHA-512. Offers strong security with moderate output size.
  • SHA-1
    160-bit hash. Legacy algorithm. Not recommended for security-sensitive uses due to known vulnerabilities.