SHA & hash generator
Generate SHA-1, SHA-256, SHA-384, and SHA-512 hashes of any text, in hex or Base64 — all in your browser.
About the SHA & hash generator
Handytool's hash generator computes SHA-1, SHA-256, SHA-384, and SHA-512 hashes of any text, live in your browser, using the Web Crypto API. Pick hex or Base64 output and copy the digest in one click. Because hashing happens locally, you can hash passwords, tokens, or sensitive content without exposing them to any server.
SHA & hash generator features
- 01
Four SHA variants
Switch instantly between SHA-1, SHA-256, SHA-384, and SHA-512. All are computed using the browser's Web Crypto API, the same implementation used by HTTPS and modern authentication systems.
- 02
Hex or Base64 output
Get the digest as a lowercase hex string (the most common format) or as Base64 (compact, used in HTTP headers and tokens). Toggle at any time without re-typing your input.
- 03
Runs entirely in your browser
Hashing uses SubtleCrypto locally. Your text never touches a server, so you can safely generate hashes of secrets, passwords (for non-authentication use), or confidential payloads.
SHA & hash generator FAQ
- What is a SHA hash?
- SHA (Secure Hash Algorithm) is a cryptographic hash function that turns any input into a fixed-length fingerprint. The same input always produces the same hash, but it's computationally infeasible to recover the input from the hash. Hashes are used for integrity checks, signatures, and content addressing.
- Which SHA variant should I choose?
- Use SHA-256 for most modern applications — it's fast and widely supported. SHA-512 is a good choice when you want extra margin on 64-bit systems. Avoid SHA-1 for anything security-sensitive; it's included here only for compatibility with legacy systems.
- Should I use SHA to hash passwords?
- No — not directly. SHA hashes are too fast, which makes them vulnerable to brute-force attacks. For password storage, use a dedicated password hashing function like bcrypt, scrypt, or Argon2. This tool is useful for content integrity, file fingerprints, and checksum comparisons.
- Why are the hashes in hex by default?
- Hex (base 16) is the most common representation for hashes because it maps cleanly to byte boundaries — every two hex digits is one byte. Base64 is more compact but less human-readable. Toggle the format depending on what the downstream system expects.
- Is my text sent to a server?
- No. Hashing happens entirely in your browser using the Web Crypto API. Nothing is uploaded, logged, or stored.
Related tools
Utility →- Live
Base64 encoder & decoder
Encode text to Base64 and decode Base64 back to text, including URL-safe Base64 — all in your browser.
UtilityRuns locallyOpen - Live
URL encoder & decoder
Percent-encode text for URLs or decode percent-encoded strings back to readable text — instantly, privately.
UtilityRuns locallyOpen - Live
UUID generator
Generate cryptographically random UUID v4 or time-ordered UUID v7 identifiers, one or many at a time — in your browser.
UtilityRuns locallyOpen
Explore other tools
All tools →- Live
PDF to JPG
Convert each page of a PDF into a sharp JPG, PNG, or WebP image right in your browser — no upload, no quality loss.
PDFRuns locallyOpen - Live
Remove background
Erase the background of a photo using an in-browser AI model — no upload, your images stay on your device.
ImageRuns locallyOpen - Live
Trim Video
Cut the start or end of a video with frame-level precision.
VideoOpen - Live
Trim audio
Cut a section of an audio file.
AudioRuns locallyOpen - Live
Markdown to HTML
Convert Markdown into clean HTML right in your browser.
DocumentRuns locallyOpen