▸ PRIVACY TERMINAL
~/tools/hash-generator
READY
Generate and verify cryptographic hashes. SHA-1, SHA-256, SHA-384, SHA-512, and MD5 — all computed client-side using the Web Crypto API. Your data never leaves your browser.

┤ OUTPUT ├
[INIT] hash-generator v1.0.0 loaded
[INFO] All processing runs in your browser
[INFO] No data is transmitted to any server
algorithm:
0 bytes

> About Cryptographic Hashes

What is a hash? A cryptographic hash function takes any input and produces a fixed-size string of characters. The same input always produces the same hash, but even a tiny change in input produces a completely different hash.

SHA-256 is the gold standard — used in Bitcoin, TLS certificates, and file integrity verification. SHA-512 provides a longer hash for additional security.

When to use each:

  • SHA-256 — General purpose, file verification, checksums
  • SHA-512 — When you need maximum hash length
  • SHA-384 — Truncated SHA-512, used in some TLS suites
  • SHA-1 — Legacy only, known vulnerabilities
  • MD5 — Broken for security, still used for non-security checksums