SHA-256 Hash of "shadow"
SHA-256
0bb09d80600eec3eb9d7793a6f859bedde2a2d83899b70bd78e961ed674b32f4
The SHA-256 hash of "shadow" is: 0bb09d80600eec3eb9d7793a6f859bedde2a2d83899b70bd78e961ed674b32f4
All hash values
SHA-256Recommended0bb09d80600eec3eb9d7793a6f859bedde2a2d83899b70bd78e961ed674b32f4
SHA-1ed9d3d832af899035363a69fd53cd3be8f71501c
SHA-38478923137c40b4fae2b73c9ddeb0b759179d35664537970687ada639ca292addd81b3caa53bd7fd9501d07fd066268dfa
SHA-51281599ec77ac571e7dfc863414be4870fdaaacc34ac970ec7d5a91c160adca3b49960d98e31e317f58fffd231fba2965ca8090e8cdab10000f6e3e8ce0bef02ba
⚠️ Do not use SHA-1 for security
SHA-1 is considered cryptographically broken. Use SHA-256 or higher for all security-sensitive applications.
How SHA-256 works
SHA-256 is a cryptographic hash function that produces a fixed 256-bit (64-character hex) output. Even a tiny change in the input produces a completely different hash. It is one-way — you cannot reverse a hash to get the original input.
Common uses for hash functions
- Password hashing and storage
- File integrity verification
- Digital signatures and certificates
- Blockchain and cryptocurrency
- Data deduplication
Generate more hashes
Loading tool...