Paranoid Qrypto: Integrity Auditor Tool

Input 1

Input 2

Controls

Select files to calculate or verify. All processing is done securely in your browser.

Verify File Integrity

Verify a single file:

Verify multiple files:

Paste Format: Hash followed by filename (space/tab separated), one per line.
a1b2c3d4... filename.zip

Results

Select files to begin.

Why File and Code Integrity Matters

In today's digital world, ensuring that a file or piece of code is exactly what it claims to be is more important than ever. When you download software, receive a document, or review source code, you are trusting that it has not been altered, corrupted, or infected with malicious code.

This tool helps you verify that integrity. By calculating a file's "hash" (also known as a checksum or digital fingerprint), you can compare it to the hash provided by the original source. If they match, you can be confident the file is authentic and unchanged. Similarly, comparing two pieces of code can reveal subtle but critical differences that could introduce bugs or security vulnerabilities.

Using a client-side tool like this one provides an extra layer of security, as your files and code are never uploaded to a server for analysis.

How to Use the Integrity Auditor

Code Comparison

  1. Navigate to the "Code Comparison" tab.
  2. Paste your text or code into the "Input 1" and "Input 2" text boxes. Alternatively, click "Or Upload File" to load content directly from a file on your device.
  3. Click the "Compare Content" button.
  4. The results will show you three levels of comparison:
    • Strict Comparison: An exact match based on the SHA-256 hash. This is the most reliable test.
    • Normalized: Checks if the content is the same after ignoring leading/trailing whitespace and standardizing line endings.
    • Whitespace-Removed: Checks if the content is identical after removing all spaces, tabs, and newlines.
  5. You can also view the "Stringified" (whitespace-removed) text for manual inspection in the section below the results.

File Hash Verifier

  1. Navigate to the "File Hash Verifier" tab.
  2. Click "Select File(s)" and choose one or more files from your device.
  3. To simply calculate hashes, click the "Calculate Hashes" button. The MD5, SHA-256, and SHA-512 hashes will be displayed for each file.
  4. To verify a file against a known hash, enter the expected hash value(s) in the appropriate fields on the right. You can either fill in the individual fields for a single file or paste a list of hashes (like from a `sha256sums.txt` file) into the large text area for multiple files.
  5. Click the "Verify Selected Files" button to see if the calculated hashes match the expected ones.

Frequently Asked Questions (FAQ)

Is this tool secure to use with sensitive files or code?

Yes. This tool is 100% client-side. All calculations and comparisons happen directly in your web browser on your computer. Your files, code, and any data you paste are never uploaded or sent to any server, ensuring your privacy and security.

What is a hash (or checksum)?

A hash is a unique, fixed-size string of characters generated from a piece of data (like a file or text). Even a tiny change in the input data will produce a completely different hash. This makes it a perfect "digital fingerprint" for verifying that a file has not been altered or corrupted.

MD5 vs. SHA-256: Which should I use?

For integrity checks, both are often sufficient. However, **SHA-256 is the modern, more secure standard.** MD5 is considered "cryptographically broken," meaning it's possible (though difficult) for two different files to produce the same MD5 hash. You should prefer SHA-256 or SHA-512 whenever possible. MD5 is included here for compatibility with older systems that still provide MD5 checksums.

Is this tool really free?

Yes, this tool is completely free to use. It is also open source, released under the Apache 2.0 License. You can view the source code, inspect its functionality, and even contribute to its development on GitHub.