Category published:  Deployment Scripting SECURITY Tools we made   Click on the Category button to get more articles regarding that product.

SignTool

Posted by admin on 09.01.2026

Full Guide to SignTool — With a Better, Fully Automatic Alternative if you just want to verify signatures

If you’re searching for SignTool, chances are you want to verify, sign, timestamp, or inspect digital signatures on executable files.

Output from: signtool.exe verify /pa /all /d signtool.exe

Before we dive into all the common signtool.exe commands and options, here’s the better starting point for most real-world needs if you JUST want to verify digital signatures.

CRLcheck.exe — our free, fully automatic signature verification tool — scans every executable on a client machine, checks digital trust and status using the same Windows trust mechanisms as SignTool, and outputs a clear table of results with many inspection and automation options. It does all this without manual command lines and works on whole systems, not just single files.

https://www.butsch.ch/post/crlcheck-exe-certificate-revocation-list-check-tool-to-verify-all-crl-and-ocsp-on-windows-client/

image

 For quick single-file checks, administrators and developers still use SignTool, so below is a complete, reorganized reference of all key commands and options it supports.

Global Options

Option What It Does
/q Quiet mode — minimal or no output on success
/v Verbose mode — detailed output and warnings
/debug Print debug information

1) Catalog Database Commands (catdb)

Option Meaning
/d Update the default catalog database
/g GUID Update the catalog database identified by GUID
/r Remove the specified catalog from the database
/u Generate a unique name when adding a catalog

2) Removing Signatures (remove)

Option Meaning
/c Remove all certificates except signer
/s Remove signature entirely
/u Remove unauthenticated attributes (timestamps etc.)
/q Quiet output
/v Verbose output

3) Signing Files (sign)

Key Fact: For modern code signing in 2026, you must specify the /fd digest algorithm (e.g., SHA256) or signing will fail.
Option What It Does
/a Selects the best available signing certificate
/ac file Add another certificate to the signature
/as Append an additional signature
/csp CSPName Specify a crypto service provider
/d description Set signed content description
/dg /ds /di Path Digest generation and signature processing flags
/dlib DLL Use a custom digest-signing DLL
/dmdf Filename Pass unmodified content for digest signing
/du URL URL for expanded description
/dxml Output XML for digest
/f file Use certificate from file (e.g., PFX)
/fd alg Digest algorithm (e.g., SHA256)
/i issuer Only use certificates matching issuer name
/kc container Private key container name
/n name Only use certificates matching subject name
/nph Suppress page hashes (when supported)
/p password Password for PFX file
/p7 path Output a PKCS#7 file
/p7ce & /p7co PKCS#7 configuration options
/ph Generate page hashes
/r rootname Force root certificate chain name
/s store Certificate store to search
/sha1 hash Use explicit SHA1 hash to pick a certificate
/sm Use machine store
/t URL Timestamp URL
/tr URL RFC 3161 timestamp URL
/td alg Digest algorithm for RFC 3161 timestamp
/u Restrict to signing usage
/uw Use Windows System Component Verification

4) Time Stamping (timestamp)

Option Meaning
/p7 Time stamp PKCS#7 files
/t URL Time stamp server URL
/tr URL RFC 3161 time stamp server URL
/td alg Digest algorithm for timestamp
/tp index Apply timestamp to specific signature index

5) Verifying Signatures (verify)

Option What It Means
/a Use all verification methods (catalog + embedded)
/ad Find catalog in default database
/all Verify every signature in a multi-signed file
/as Use system component (driver) catalog
/ag CatDBGUID Search catalog by GUID
/c CatFile Specify catalog file
/d Print description/URL
/ds index Verify a specific signature index
/hash {SHA1|SHA256} Verify by specific hash
/kp Use kernel-mode driver signing policy
/ms Multiple verification semantics
/o Version Verify for specific OS version
/p7 Verify PKCS#7 files
/pa Use Default Authentication Policy
/pg PolicyGUID Use custom policy GUID
/ph Print & verify page hashes
/r RootSubjectName Chain to specific root
/tw Warn if no timestamp present

This is exactly why CRLcheck.exe exists: it automatically scans every executable on a system, validates all signatures, handles catalogs and timestamps, and outputs a structured trust table — no scripting required. It’s the ideal solution when manual SignTool commands aren’t enough.

Samples checking the digital signature of signtool.exe itself:

signtool.exe verify /pa signtool.exe

File: signtool.exe
Index  Algorithm  Timestamp
========================================
0      sha256     RFC3161

signtool.exe verify /pa /all /d /v signtool.exe

c:\edv\MS_SIGNTOOL>signtool verify /pa /all /d /v signtool.exe

Verifying: signtool.exe

Signature Index: 0 (Primary Signature)
Hash of file (sha256): ADE69FC117FB4145843E5C9B3744DB20F21BECF237D7CCF76AA3D94AF8968846

Signing Certificate Chain:
    Issued to: Microsoft Root Certificate Authority 2010
    Issued by: Microsoft Root Certificate Authority 2010
    Expires:   Sat Jun 23 23:04:01 2035
    SHA1 hash: 3B1EFD3A66EA28B16697394703A72CA340A05BD5

        Issued to: Microsoft Windows Code Signing PCA 2024
        Issued by: Microsoft Root Certificate Authority 2010
        Expires:   Sat Jun 23 23:04:01 2035
        SHA1 hash: D30F05F637E605239C0070D1EA9860D434AC2A94

            Issued to: Microsoft Corporation
            Issued by: Microsoft Windows Code Signing PCA 2024
            Expires:   Wed May 06 19:24:54 2026
            SHA1 hash: 6ACE61BAE3F09F4DD2697806D73E022CBFE70EB4

The signature is timestamped: Wed Oct 15 09:43:55 2025
Timestamp Verified by:
    Issued to: Microsoft Root Certificate Authority 2010
    Issued by: Microsoft Root Certificate Authority 2010
    Expires:   Sat Jun 23 23:04:01 2035
    SHA1 hash: 3B1EFD3A66EA28B16697394703A72CA340A05BD5

        Issued to: Microsoft Time-Stamp PCA 2010
        Issued by: Microsoft Root Certificate Authority 2010
        Expires:   Mon Sep 30 19:32:25 2030
        SHA1 hash: 36056A5662DCADECF82CC14C8B80EC5E0BCC59A6

            Issued to: Microsoft Time-Stamp Service
            Issued by: Microsoft Time-Stamp PCA 2010
            Expires:   Wed Apr 22 20:42:47 2026
            SHA1 hash: BA3D81D1C3DFBD487FB5A70CBAAB3546DE4F656E

Description:     Microsoft Windows
Description URL: http://www.microsoft.com/windows


Successfully verified: signtool.exe

Number of signatures successfully Verified: 1
Number of warnings: 0
Number of errors: 0

 

Successfully verified: signtool.exe

LINK MS:

https://learn.microsoft.com/en-us/windows/win32/seccrypto/using-signtool-to-verify-a-file-signature

Download CRLcheck freeware

https://www.butsch.ch/post/crlcheck-exe-certificate-revocation-list-check-tool-to-verify-all-crl-and-ocsp-on-windows-client/

Where to download the signtool.exe itself:

1. Download the Installer
Visit the official Windows SDK Downloads page.
Download the installer for the latest version. For most general development in early 2026, you should use Windows SDK 10.0.26100.x.
Note: An early-release SDK (version 10.0.28000.1) is also available for developers preparing for the next-generation OS release.

2. Select the “Signing Tools” Feature
During the installation process, you do not need to install the entire 3GB+ SDK. In the “Select the features you want to install” dialog, check only:
Windows SDK Signing Tools for Desktop Apps.

3. Locate the Executable
Once installed, signtool.exe is placed in a versioned subfolder. The default path on a 64-bit system is:
C:\Program Files (x86)\Windows Kits\10\bin\<Version Number>\x64\signtool.exe.
Example for the 2026 stable release:
C:\Program Files (x86)\Windows Kits\10\bin\10.0.26100.0\x64\signtool.exe

image

Another way to download:

  • Open a web browser in https://learn.microsoft.com/en-us/windows/win32/seccrypto/signtool
  • Click the Windows Software Development Kit (SDK) link
  • Click Download the installer.
  • Complete the steps of the installation wizard. In the Select the features you want install dialog, you only need to check the Windows SDK Signing Tools for Desktop Apps box.

 

 


 Category published:  Deployment Scripting SECURITY Tools we made   Click on the Category button to get more articles regarding that product.