Generate cryptographic hashes from text using the Web Crypto API. Everything runs in your browser.
SHA-256
Click “Generate” or start typing
SHA-384
—
SHA-512
—
SHA-1 (legacy)
—
About these hashes: SHA-256 is the most widely used — suitable for checksums, data integrity, and password hashing (with a salt). SHA-384 and SHA-512 offer longer digests for higher security requirements. SHA-1 is included for legacy compatibility but is considered cryptographically broken for collision resistance. All hashing is done client-side using the browser's native crypto.subtle API.