Hash / HMAC Generator

Generate hash values instantly from text input. You can also compute HMAC with a shared secret key on one screen.

Status

Runs in your browser. No input is sent to a server.

How to use

Choose mode and algorithm, then click Generate. Enter a secret key for HMAC mode. Copy results in hex or base64.

Notes (this tool)

  • An empty string is still a valid input. Confirm whether your API allows it.
  • Never share HMAC secrets. Avoid posting them in chats or logs.

About this page

What does this tool do?

Computes SHA-family digests or HMAC from input text and outputs both hex and base64.

A lightweight utility for API-signature debugging, webhook verification checks, and test data generation.

What this tool does

  • Compute SHA-256 / SHA-384 / SHA-512 / SHA-1
  • Compute HMAC for the same input
  • Output both hex and base64
  • One-click copy of output

Practical workflow

  • Start with mode=Hash to confirm baseline digest
  • Switch to mode=HMAC when a shared secret is involved
  • Copy output in the format required by your API spec (hex/base64)

Notes

  • This page assumes UTF-8 text input. Binary inputs require separate byte handling.
  • SHA-1 is for compatibility only. Prefer SHA-256 or stronger for new designs.

Referenced specs

  • FIPS 180-4 (Secure Hash Standard)
  • RFC 2104 (HMAC)
  • W3C Web Crypto API

FAQ

What is the difference between hash and HMAC?

A hash uses only the message input. HMAC also uses a shared secret key, making it suitable for tamper detection.

My result does not match the server output.

Check charset, newline style, leading/trailing spaces, and secret-key text. This tool hashes UTF-8 text.

References

  1. FIPS 180-4
  2. RFC 2104
  3. Web Crypto API

These links are generated from site_map rules in recommended diagnostic order.

  1. WP Security Checklist Builder — Generate security operation checklists for WordPress
  2. htpasswd Generator — Generate username:hash lines for .htpasswd
  3. WordPress Salt Generator — Generate 8 wp-config.php secret key constants
  4. Token Format Checker — Infer JWT/UUID/Hex/Base64URL candidates from input text
  5. Random Password — Generate random passwords with length, charset, and exclusion options
  6. Password Seed Generator — Derive reproducible passwords from seed and constraints
  7. Random Token Generator — Generate random tokens with selectable byte size and encoding
  8. URL Safe Random — Generate random strings using URL/filename-safe characters

Security Operations

Generate practical passwords, tokens, and operation checklists quickly