Paste a hash you got from somewhere (a download page, a security advisory, a colleague) and check whether your text or file produces that exact value. The algorithm is detected automatically from the hash format and length — MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, CRC-32, Adler-32, FNV-1a, DJB2.
Verification re-computes the hash of your input and compares it byte-by-byte (well, character-by-character) with the value you supplied. Same input + same algorithm = same hash, every time. If even one byte of input differs, the resulting hash is completely different.
A publisher lists a SHA-256 next to a download. Drop the downloaded file here, paste the published hash, and check — same hash means the download is authentic and intact.
Hash algorithm is detected from length: 32 chars = MD5, 40 = SHA-1, 56 = SHA-224, 64 = SHA-256, 96 = SHA-384, 128 = SHA-512, 8 chars = CRC-32/Adler-32/FNV-1a/DJB2 (those four collide on length so all are tried).
For the 8-character non-cryptographic hashes (CRC-32, Adler-32, FNV-1a, DJB2), use the dropdown to specify exactly which one. Otherwise the tool reports all four if any match.
Switch between Text mode (verify a known string) and File mode (verify a file's checksum). File verification matches what sha256sum, md5sum, and CertUtil produce on the command line.
The hash is computed in your browser using the Web Crypto API and a small amount of pure JavaScript. Your text, file, and the hash you paste — none of it is uploaded.
For text, results appear in milliseconds. For large files (hundreds of MB), the file is read once and all matching algorithms are computed — typically under a second on modern hardware.