Bcrypt & Hash Generator

Hash passwords with SHA-256, SHA-512, SHA-1. Add optional salt. Verify password against hash. Client-side, private.

Mode

Algorithm

Cost/rounds (bcrypt reference — not used for SHA)10

Password

Password Hashing Basics

Hashing converts a password into a fixed-length string that cannot be reversed. When a user logs in, you hash their input and compare it to the stored hash. If they match, the password is correct. Good hashing uses salt (random data) to prevent rainbow table attacks.

SHA-256, SHA-512, and SHA-1

SHA-256 and SHA-512 are from the SHA-2 family and are recommended for general hashing. SHA-1 is older and broken for collision resistance but still used in legacy systems. For password storage, dedicated algorithms like bcrypt or Argon2 are preferred because they're deliberately slow.

When to Use This Tool

Use this tool to quickly hash strings for checksums, to verify a password against a known hash (e.g. from a config file), or to understand how hashing works. For production applications, implement bcrypt or Argon2 on your server. This client-side tool is for development, testing, and learning.

Frequently Asked Questions

Related Tools

Explore More Tools

Find this tool useful? Buy us a coffee to keep DuskTools free and ad-light.