Cybersecurity Tools
File Hash Generator
Generate cryptographic checksums for any file β SHA-256, SHA-512, SHA-384, and SHA-1. Verify file integrity by pasting a known hash and checking it against the computed value. Works entirely in your browser using the FileReader API and Web Crypto API β files are never uploaded.
Files are read locally only. No data is uploaded.
Select Algorithms
Drop files to hash
Any file type β multiple files supported β files never leave your browser
File Integrity Verification Guide
When you download software, the publisher often provides a checksum (e.g. SHA-256: a3b4c5β¦). Hashing the downloaded file and comparing it to the published checksum confirms the file hasn't been tampered with or corrupted in transit.
Paste the expected hash into the Verify Hash field that appears after hashing a file. A green match means the file is exactly as the publisher intended.
| Algorithm | Output Length | Status | Use For |
|---|---|---|---|
| SHA-1 | 40 hex chars | Deprecated | Legacy systems only |
| SHA-256 | 64 hex chars | Recommended | General integrity verification |
| SHA-384 | 96 hex chars | Secure | Subresource Integrity (SRI) |
| SHA-512 | 128 hex chars | Secure | High-security applications |