File hash checker — MD5, SHA-1, and SHA-256 checksums for uploads and release verification

Use this free online file hash checker to compute MD5, SHA-1, and SHA-256 digests from the exact bytes of any file you select—installers, ZIP exports, disk images, CSV dumps, firmware, or media. You get lowercase hexadecimal strings you can paste next to vendor checksums, CI artifacts, and internal integrity verification docs. Everything runs in your browser: the File API loads data locally, SHA-family hashes use Web Crypto, and MD5 uses the same vetted library as our text hash generator—so nothing is uploaded for hashing. When you need to embed small assets as strings instead of checksums, use the image to Base64 tool; when you only inspect photo metadata, open the image metadata viewer. More utilities live in our file and data tools catalog on the home page.

Drag and drop a file here, or use .

No file hashed yet. Upload any file to compute MD5, SHA-1, and SHA-256 digests for integrity checks and release verification.

Files stay in your browser. Hashes detect accidental corruption, not malware—use antivirus and trusted sources in addition to checksums.

What is a file checksum and when teams verify MD5 or SHA-256

A cryptographic hash maps an entire file to a short fingerprint. MD5 (128 bits), SHA-1 (160 bits), and SHA-256 (256 bits) are one-way: you cannot recover the file from the digest, but you can confirm whether two copies are bitwise identical. Security teams deprecate MD5 and SHA-1 for signatures and passwords, yet release engineers still publish download checksums because they catch truncated HTTP responses, bad USB copies, and mistaken attachments. Modern guides increasingly standardize on SHA-256; this page shows all three so you can match whatever a README or package index still lists.

Searchers often look for calculate MD5 of file online, SHA256 hash file, or verify ISO checksum. The workflow is identical: hash the bytes you actually have, then compare case-insensitively to the published hex string (we output lowercase for consistency). For hashing UTF-8 strings instead of raw files—JWT fixtures, cache keys, or API samples—keep the hash generator open in another tab.

How to use this file hash checker (step by step)

  1. Click Upload file or drag a file into the dashed drop zone. There is no file-type filter—binaries, archives, documents, and datasets all work.
  2. Wait for the status line to finish. Large files take longer because the whole file is read into memory for digest computation; if you hit the on-page limit, switch to a desktop utility that streams from disk.
  3. Compare each digest with the publisher’s documentation. If they only publish one algorithm, ignore the others or use them as a cross-check for your own records.
  4. Press the Copy buttons (with the copy icon) beside MD5, SHA-1, or SHA-256, or use Copy all checksums for a multi-line block. Use Clear before hashing another path.

Integrity vs. authenticity: what hashing proves

Matching a checksum proves your bits equal the reference bits at the time someone generated that reference—it does not prove the file is safe, licensed, or unmodified by an attacker who also controls the download page. Combine hash verification with HTTPS, signed releases (GPG or Sigstore), and organizational policies. Inside CI, store expected digests as secrets or lockfile metadata and fail pipelines on mismatch.

Privacy and limits for sensitive exports

Because processing stays in-tab, you avoid sending proprietary CSV or database dumps to random cloud converters. Very large files can still stress RAM; prefer command-line certutil, shasum, or Get-FileHash when hashing multi-gigabyte artifacts regularly. For tabular QA after hashing, pair with the CSV viewer or CSV deduplicator.

Related file and developer tools

Browse the full file and data tools section. Highlights:

  • CSV Viewer & EditorOpen CSV as a sortable, filterable table, tweak cells, and export without a spreadsheet app.
  • CSV DeduplicatorRemove duplicate rows by chosen columns to clean mailing lists and product feeds.
  • CSV to SQL ConverterGenerate INSERT statements from a CSV for quick database seeding and migrations.
  • Image to Base64 ConverterEncode images to Base64 data URIs for embedding in HTML, CSS, or API payloads.
  • Image ResizerResize by pixels or percentage in the browser—privacy-friendly, no server upload required.
  • Image CompressorShrink JPG and PNG with quality control and before/after size stats for faster pages.
  • Image Format ConverterConvert between JPG, PNG, and WebP locally to match CMS, email, and performance needs.
  • Image Metadata ViewerInspect EXIF: camera, lens, GPS, dimensions, and exposure—great for photographers and forensics.
  • SVG OptimizerMinify and clean SVG markup to cut file size for icons, illustrations, and inline graphics.
  • Hash generator (text)MD5, SHA-1, SHA-256, and SHA-512 from UTF-8 strings for APIs and tests.
  • Base64 encoder & decoderEncode arbitrary files or text when payloads—not checksums—must travel as ASCII.

Frequently asked questions

What is a file hash and why verify downloads with MD5 or SHA-256?
A file hash (digest) is a fixed-length fingerprint of a file’s exact bytes. If even one bit changes, the hash usually changes completely. Publishers publish MD5, SHA-1, or SHA-256 checksums so you can confirm your copy matches theirs after a download, mirror sync, or USB transfer. SHA-256 is preferred today; MD5 and SHA-1 remain common on older release pages and legacy tooling.
Are my files uploaded to your servers?
No. The File API reads bytes into an ArrayBuffer inside your browser tab. MD5 runs locally via a small library; SHA-1 and SHA-256 use the Web Crypto API. Nothing is sent to our backend for hashing.
How is this different from the text hash generator on the site page?
The hash generator hashes UTF-8 text you type or paste. This page hashes raw file bytes exactly as stored on disk—ideal for installers, disk images, CSV exports, and firmware. For string payloads and API examples, use the text-based hash generator instead.
Why might my hash not match the publisher’s checksum?
Common causes: a partial or corrupted download, extracting archives that alter line endings, editing the file after download, comparing against a hash of a different version, or the publisher documenting a hash of the zipped bundle while you hashed the inner file. Re-download, confirm which artifact the checksum covers, and compare the same algorithm (e.g. both SHA-256).
Is MD5 or SHA-1 safe for passwords or signatures?
No. MD5 and SHA-1 are not suitable for password storage or digital signatures because collision attacks exist in adversarial settings. They are still widely used for non-cryptographic checksums and legacy verification. Prefer SHA-256 when publishers offer it.
Is there a maximum file size?
Very large files are read fully into memory in the tab, which can be slow or fail on low-memory devices. This page enforces a 200 MB soft limit with a clear error message; for multi-gigabyte ISOs, use a desktop checksum utility or command-line tools that stream from disk.
Can I hash binary files, not just text?
Yes. Any file type is supported: executables, images, PDFs, databases, and more. The digest always reflects the exact byte sequence of the file you selected.