Strip path-traversal sequences, fix Windows-reserved characters, normalise to UTF-8, and remove NUL bytes. Essential before extracting untrusted ZIPs.
Per-job file size, entry count, and batch caps for Filename Sanitiser. Limits apply to every Archive tool in JAD Apps; upgrade for larger uploads and bigger batches.
| Tier | Max archive size | Max entries / archive | Max files per batch |
|---|---|---|---|
| Free | 47.7 MB | 500 | 1 |
| Pro | 476.8 MB | 50,000 | 20 |
| Developer | 1.86 GB | 50,000 | 20 |
Drop your ZIP archive
We rewrite every entry name: collapse .. (path traversal), replace <>:"/\|?* with _, ensure UTF-8
Download a sanitised ZIP with a report of every name change applied
0 bytes uploaded. Archive Filename Sanitiser runs entirely in your browser using fflate, zip.js, and libarchive WASM. Your archive files never leave your device.
An archive entry named ../../etc/passwd, when extracted naively, can overwrite system files. This is the Zip Slip vulnerability (CVE-2018-1002200 family). Always sanitise filenames before extracting untrusted archives.
< > : " / \ | ? * and the control characters (0x00-0x1F). Names like CON, PRN, AUX, NUL are also reserved. We replace forbidden chars with _ and append a numeric suffix to reserved names.
Only entry names change — file data is untouched. After sanitising, references inside files (e.g., a manifest pointing at the renamed entry) may need a manual update.
Strip zero-content directory entries that don't contain any files. Trims macOS Finder ZIPs and some build tools' output. Browser-native, zero upload.
Open toolStrip a common top-level folder (e.g. project-master/) from every entry in a ZIP. Cleans up GitHub release ZIPs and similar wrapped archives.
Open toolSet every entry's date/time to a single UTC value. Essential for reproducible builds, deterministic CI, and bit-identical artifact comparisons.
Open tool