ToolsOps

Security and authentication

Integrity verification and JWT decoding with Web Crypto API: the files, tokens, secrets and keys you provide are processed in your browser.

Who this collection is for

Aimed at developers, security teams and sysadmins who need to verify a download's integrity, decode a session token or compute a cryptographic hash of a string. The three share a property: the file, token or secret you provide is processed locally and is not sent to any server.

Hash computation uses Web Crypto API for SHA-* and local code for MD5. JWT signature verification uses Web Crypto API for HMAC, RSA and ECDSA. No input (text, file, secret, key) is sent to any server. Verify it by opening DevTools on the Network tab while using each tool.

Tools in this collection

The two utilities in the cluster, with complementary tasks: hash for content integrity, JWT for token-based authentication.

Hash and checksum calculator (SHA-256, MD5, SHA-512)

Hash and checksum calculator with SHA-256, SHA-1, SHA-384, SHA-512 and MD5 over text or files. Includes an expected hash field to verify downloads.

  • Hash pasted text or dropped files without sending anything to a server.
  • Compare with the published hash to confirm bit-for-bit integrity.
  • MD5 flagged as legacy with clear pointers toward SHA-256.

Open the hash calculator →

JWT decoder and verifier (HS256, RS256, ES256)

JWT decoder and verifier with HS256/384/512, RS256/384/512 and ES256/384/512. Rejects `alg: none` and flags algorithm/key mismatches.

  • Decodes header and payload showing temporal claims and token state.
  • Verifies signature with HMAC secret, PEM public key or JWK, no network.
  • Clearly separates decoding from verifying.

Open the JWT decoder →

Which tool to use

Quick decisions based on what you have in front of you.
Your situationTool
I want to verify that a downloaded .iso matches the published SHA-256Hash / checksum
I have a JWT from a log and I need to read its claimsJWT decoder
I want to confirm that a JWT was really signed by my identity providerJWT decoder (verify)
I need a SHA-256 digest of a stable string as an identifierHash / checksum
I see a token declaring `alg: none` and want to audit the riskJWT decoder (rejects alg none)

Go deeper

The two editorial guides in this cluster cover the concepts behind the tools: hash functions and checksums for integrity, and JWT in practice with claims, expiration and common pitfalls.