About This Tool
A cryptographic hash is a fixed-length fingerprint derived entirely from a file's contents. Even a single changed byte produces a completely different hash value, making hashes the standard tool for verifying file integrity — confirming that a downloaded ISO, firmware package, or archive has not been tampered with or corrupted in transit. This tool computes both SHA-256 and MD5 hashes for any file you drop onto it, entirely inside your browser using the native Web Crypto API with no external dependencies.
SHA-256 is the modern standard for security-sensitive integrity checks — it is used by code-signing authorities, package registries like npm and PyPI, and operating system update systems. MD5 is an older algorithm that is cryptographically broken for security purposes but remains widely used for fast checksums on trusted networks and legacy verification workflows. Providing both gives you maximum compatibility when cross-referencing against published hash values from software download pages or documentation.
The file comparison feature is especially practical for catching silent data corruption or confirming that two copies of a file are byte-for-byte identical — for example, verifying a backup matches the original, or confirming a build artifact was not modified after its hash was published. Drop a second file into the compare slot and the tool immediately reports whether the SHA-256 fingerprints match. All computation runs locally in your browser; no file content is ever transmitted anywhere.