Skip to main content

Crypto & Security Utilities

Hash text and files · Generate UUIDs · Create strong passwords — all in your browser, nothing sent anywhere

Input

🔐
Hash any text or file
SHA-1 · SHA-256 · SHA-384 · SHA-512

Hash Generator, UUID Generator & Password Generator — Free Online Tool

Three essential crypto tools in one place — all running entirely in your browser. Generate SHA-256, SHA-384, and SHA-512 hashes from text or files. Create cryptographically random UUID v4 identifiers in bulk. Build secure passwords with configurable character sets, a real-time entropy meter, and strength indicator. No data ever leaves your device.

Key Features

  • SHA-1, SHA-256, SHA-384, SHA-512 hash generation from text or file upload
  • Hash all four algorithms simultaneously for quick comparison
  • UUID v4 generator — generate 1 to 100 UUIDs at once
  • UUID output in standard, UPPERCASE, or no-dashes format
  • Password generator with configurable length (6–128 chars)
  • Charset options: uppercase, lowercase, numbers, symbols
  • Exclude ambiguous characters (0/O, l/1/I) for readable passwords
  • Real-time entropy meter and strength label (Very Weak → Very Strong)
  • 100% client-side — nothing is sent to any server

Common Use Cases

  • Verifying file integrity by comparing SHA-256 hashes
  • Generating unique IDs for database records, API keys, or session tokens
  • Creating secure passwords that meet specific complexity requirements
  • Checking hash values for downloaded software or archives
  • Bulk UUID generation for mock data or test fixtures
  • Security audits requiring entropy analysis of password policies

Frequently Asked Questions

Which hash algorithm should I use?

SHA-256 is the safe default for most uses — file integrity, checksums, API signatures. SHA-384 and SHA-512 offer larger outputs for higher security requirements. SHA-1 is shown for legacy compatibility only; avoid it for new security-sensitive uses.

Are the generated passwords truly random?

Yes. Passwords are generated using the Web Crypto API's `crypto.getRandomValues()`, which provides cryptographically secure randomness. This is the same API browsers use for TLS key generation.

What is entropy and why does it matter?

Entropy measures the unpredictability of a password in bits. A 12-character password using uppercase, lowercase, numbers, and symbols has ~79 bits of entropy — considered Strong. More bits means harder to brute-force. Aim for 60+ bits minimum.

Can I hash a file instead of pasting text?

Yes. In the Hash tab, click "Choose File" to upload any file. The tool reads it entirely in your browser and computes all four SHA hashes simultaneously. Files are never uploaded to a server.

100% private. All processing happens in your browser. Your data never leaves your device — no server uploads, no accounts required, no tracking.