Cybersecurity Tools

File Hash Generator

Generate cryptographic checksums for any file β€” SHA-256, SHA-512, SHA-384, and SHA-1. Verify file integrity by pasting a known hash and checking it against the computed value. Works entirely in your browser using the FileReader API and Web Crypto API β€” files are never uploaded.

Files are read locally only. No data is uploaded.
Select Algorithms
πŸ“
Drop files to hash
Any file type β€” multiple files supported β€” files never leave your browser
File Integrity Verification Guide

When you download software, the publisher often provides a checksum (e.g. SHA-256: a3b4c5…). Hashing the downloaded file and comparing it to the published checksum confirms the file hasn't been tampered with or corrupted in transit.

Paste the expected hash into the Verify Hash field that appears after hashing a file. A green match means the file is exactly as the publisher intended.

AlgorithmOutput LengthStatusUse For
SHA-140 hex charsDeprecatedLegacy systems only
SHA-25664 hex charsRecommendedGeneral integrity verification
SHA-38496 hex charsSecureSubresource Integrity (SRI)
SHA-512128 hex charsSecureHigh-security applications