Handytool
UtilityRuns locally

SHA & hash generator

Generate SHA-1, SHA-256, SHA-384, and SHA-512 hashes of any text, in hex or Base64 — all in your browser.

Format
Algorithm
Text
0 lines0 bytes
Digest
0 lines0 bytes

About the SHA & hash generator

Handytool's hash generator computes SHA-1, SHA-256, SHA-384, and SHA-512 hashes of any text, live in your browser, using the Web Crypto API. Pick hex or Base64 output and copy the digest in one click. Because hashing happens locally, you can hash passwords, tokens, or sensitive content without exposing them to any server.

SHA & hash generator features

  • 01

    Four SHA variants

    Switch instantly between SHA-1, SHA-256, SHA-384, and SHA-512. All are computed using the browser's Web Crypto API, the same implementation used by HTTPS and modern authentication systems.

  • 02

    Hex or Base64 output

    Get the digest as a lowercase hex string (the most common format) or as Base64 (compact, used in HTTP headers and tokens). Toggle at any time without re-typing your input.

  • 03

    Runs entirely in your browser

    Hashing uses SubtleCrypto locally. Your text never touches a server, so you can safely generate hashes of secrets, passwords (for non-authentication use), or confidential payloads.

SHA & hash generator FAQ

What is a SHA hash?
SHA (Secure Hash Algorithm) is a cryptographic hash function that turns any input into a fixed-length fingerprint. The same input always produces the same hash, but it's computationally infeasible to recover the input from the hash. Hashes are used for integrity checks, signatures, and content addressing.
Which SHA variant should I choose?
Use SHA-256 for most modern applications — it's fast and widely supported. SHA-512 is a good choice when you want extra margin on 64-bit systems. Avoid SHA-1 for anything security-sensitive; it's included here only for compatibility with legacy systems.
Should I use SHA to hash passwords?
No — not directly. SHA hashes are too fast, which makes them vulnerable to brute-force attacks. For password storage, use a dedicated password hashing function like bcrypt, scrypt, or Argon2. This tool is useful for content integrity, file fingerprints, and checksum comparisons.
Why are the hashes in hex by default?
Hex (base 16) is the most common representation for hashes because it maps cleanly to byte boundaries — every two hex digits is one byte. Base64 is more compact but less human-readable. Toggle the format depending on what the downstream system expects.
Is my text sent to a server?
No. Hashing happens entirely in your browser using the Web Crypto API. Nothing is uploaded, logged, or stored.

Related tools

Utility

Explore other tools

All tools