How to Verify a File Checksum Online (SHA-256, MD5, Free)
You downloaded a 4 GB Linux ISO over a sketchy connection. The publisher posted a SHA-256 checksum next to the download link. The download finished, but did it land intact? Did some byte flip on the way? Did a man-in-the-middle swap the file for a tampered version? The answer is one hash check away — and you don't need to install anything to do it.
In this guide you'll learn how to verify file checksum values online using PDFFlare's File Checksum tool — drop the file, paste the publisher's expected hash, get an instant ✓ Match or ✗ Mismatch. Works as a sha256 file checksum verifier for ISO downloads, an md5 file hash online tool for legacy archives, a file hash calculator for any binary, and a file integrity checker for backups. Use it whenever you need to verify download checksum integrity in one click. Runs entirely in your browser; the file never uploads anywhere.
What Is a File Checksum and Why Verify It?
A checksum is a cryptographic fingerprint of a file. Run any modern hash function (SHA-256 is the standard in 2026) over the file's raw bytes and you get a fixed-size digest — 64 hex characters for SHA-256, 32 for MD5. Change a single byte anywhere in the file and the digest changes completely. Reproducible, deterministic, sensitive to even one-bit tampering.
When a publisher releases software, they compute the SHA-256 once on their build server and post the result alongside the download. When you download the file, you compute SHA-256 on YOUR copy. If the digests match, the bytes you have are byte-for-byte the bytes the publisher signed. Mismatch means corruption (network glitch, disk error) or, worse, tampering (compromised CDN, MITM attack, swapped binary).
This is why every reputable Linux distro, every major package manager, and every security-conscious open-source project ships checksums alongside binaries. Skipping the check is fine 99% of the time. The 1% is when an automatic security tool would have saved you hours of triage.
How to Verify a File Checksum Step by Step
- Open the file checksum tool. Visit /tools/dev/file-checksum. No login, no signup, no install. Loads in under a second.
- Drop the file in. Drag your downloaded file into the upload area, or click to pick. The tool accepts any file type — ISO, .deb, .dmg, .exe, .tar.gz, anything. The bytes are read locally; nothing uploads.
- Wait for the hash (a few seconds). For files under 200 MB, all five hashes (MD5, SHA-1, SHA-256, SHA-384, SHA-512) compute in seconds. Larger files show a progress bar so you know how far the read is.
- Locate the publisher's expected hash. On the project's download page, look for a SHA-256SUMS, CHECKSUMS, or RELEASE_HASHES file — or the hash printed inline next to the download link. Copy just the hex digest.
- Paste into the Verify section.Scroll to the “Verify against a published hash” block, paste the expected hash, and confirm the algorithm matches what the publisher posted (almost always SHA-256).
- Read the result.Green ✓ Match means your file is byte-identical to the publisher's. Red ✗ Mismatch means re-download. The tool uses constant-time comparison so timing attacks aren't possible.
Common Checksum Verification Workflows
How to verify a Linux ISO checksum (Ubuntu, Fedora, Debian)
Every major distro publishes a SHA-256SUMS file alongside ISO downloads. For Ubuntu, it's at releases.ubuntu.com/<version>/SHA256SUMS. Open that file in a browser, copy the 64-character hex hash on the line matching your ISO filename, then paste into PDFFlare's verify field. The publisher also signs the SHA256SUMS file with their GPG key — that's a separate trust step, but the hash comparison itself is what catches corruption + most tampering.
How to verify a software release on GitHub or GitLab
GitHub releases often include a checksums.txt or .sha256 file in the assets. Download it, copy the hex hash for your platform's binary, drop the binary into PDFFlare, paste the hash, verify. If the project signs releases with cosign or GPG, follow up with the signature check via the publisher's recommended tooling — that part requires a CLI client.
How to verify a sha256 file checksum on a corporate download
Internal vendor releases (custom packages, enterprise software) frequently ship a hash via a separate channel — email, ticket, intranet. The point of the secondary channel is integrity assurance: an attacker who tampered with the package would also have to tamper with the email. PDFFlare reads the file locally, so even files that legally can't be uploaded to a third-party service can still be verified here.
How to verify a backup against its original
When you copy a backup or archive to a new drive, hash both the source and the destination separately. If the digests match byte-for-byte, the copy is intact. Even better — keep the source hash in your backup metadata so you can verify months or years later that the archived file hasn't bit-rotted on disk.
Common Mistakes When Verifying a Checksum
Comparing the wrong algorithm's digest
The publisher's page shows both an MD5 and a SHA-256. You paste the SHA-256 but leave the algorithm select on MD5. Result: guaranteed mismatch. Always confirm the algorithm matches what was published — PDFFlare's select makes this explicit, but it's an easy fat-finger error.
Verifying the wrong file
The publisher releases a Linux ARM64 ISO and an x86 ISO with different hashes. You download x86 and try to match the ARM64 hash. Mismatch is correct — but it looks like corruption. Always line up the filename in the SHA256SUMS file with the file you actually downloaded.
Hashing a partial download
The download stalled at 87%, you click Verify, the tool dutifully hashes whatever bytes are present, and you get a mismatch. Check the file size against the publisher's posted size before hashing. If you're short, the file is incomplete; redownload.
Trusting only the hash without checking the source
A SHA-256 confirms your file matches the SHA-256 you compared against. But where did that SHA-256 come from? If both the download and the hash were served from the same compromised CDN, an attacker could have replaced both. Real defense: get the hash from a separate trusted channel (the project's GitHub, a signed release announcement) or verify the publisher's GPG signature on the SHA-256SUMS file itself. The hash check is necessary but not always sufficient.
Re-downloading without identifying the cause of mismatch
A mismatch sometimes resolves on re-download (transient network corruption). But if it persists, the issue isn't random — it's either consistent network interference, a compromised mirror, or the publisher's posted hash is stale. Don't loop on re-downloads forever; pivot to checking the source.
Privacy and Security Notes
Reading happens via the browser's File API, hashing happens in crypto.subtle.digest()for SHA + a local MD5 module. PDFFlare's file integrity checker never sends your file to any server, never logs filenames, never caches anything. You can verify by watching the Network tab in your browser dev tools while the tool runs — there will be zero requests to pdfflare.com during the hash computation.
That said, the file is in your browser's memory while the read is in progress. If you're hashing genuinely sensitive material (encrypted backups whose contents matter, internal builds under NDA), close the tab when you're done. The browser frees the memory, the file is gone from the page. No residual storage.
Related Tools
- Hash Generator (text input) — for hashing strings, JWT payloads, webhook bodies, cache keys. Same algorithms as File Checksum but different input mode.
- JWT Decoder — paste a JSON Web Token, see header + payload + signature broken out. Useful when a hash you computed is part of a JWT signing chain.
- Base64 Encode / Decode — convert hex digests to base64 (some publishers post their hashes in base64 instead of hex).
- UUID Generator — generate UUIDs for backup filenames, archive IDs, content-addressed storage keys.
Wrapping Up
Verifying a file checksum is a thirty-second insurance policy against half a day of debugging a mysteriously broken install. Drop the file, paste the publisher's SHA-256, get a green ✓ — and ship with confidence. The 1% of the time the check catches actual corruption is the 1% you really want to catch before flashing your install media or trusting a binary's output.
Bookmark the File Checksum tool for the next time you download anything that matters. Free, browser-only, no signup — and now the sha256sum online utility that actually keeps your file in your browser.