Generate SHA-256, SHA-512, SHA-384, and SHA-1 hashes instantly. Hash text or files, create HMACs with a secret key, and compare hash values -- all client-side using the Web Crypto API. Your data never leaves your browser.
Type or paste text and see SHA-256, SHA-512, SHA-384, and SHA-1 hashes generated in real time. Uses the browser's native Web Crypto API for maximum performance and security.
Drag and drop any file to compute its hash values. Verify file integrity, check downloads, or compare checksums -- all without uploading anything to a server.
Enable HMAC mode and provide a secret key to generate keyed-hash message authentication codes. Useful for API signatures, webhook verification, and data integrity checks.
Paste two hash values to instantly check if they match. Case-insensitive comparison makes it easy to verify checksums from different sources.
A cryptographic hash function takes an input (or "message") and returns a fixed-size string of bytes. The output, called the hash value or digest, appears random but is deterministic -- the same input always produces the same output. Hash functions are fundamental to modern security, used for data integrity verification, password storage, digital signatures, and more.
HMAC (Hash-based Message Authentication Code) combines a cryptographic hash function with a secret key. Unlike a plain hash, an HMAC proves both data integrity and authenticity -- only someone with the secret key can generate a valid HMAC for a given message. HMACs are widely used in API authentication (e.g., AWS Signature Version 4), webhook verification (e.g., GitHub, Stripe), and session token generation.
sha256sum on Linux/macOS or Get-FileHash on PowerShell.
Check out our other free developer tools. Decode JWTs, format JSON, parse cron expressions, and more -- all from your browser with no sign-up required.
JWT Decoder →