Downloads

Validator Tools desktop builds for macOS, Windows and Linux.

Signed, offline-first installers built for operators. Stable rail for production use, preview rail for trying new flows such as Pectra combos, MEV policy rehearsal and custody-safety updates.

Offline-first No telemetry Air-gapped friendly
Stable rail Signed
For production operators
  • Audited flows for exits, consolidations, withdrawals
  • Weekly cadence; only security or UX fixes mid-cycle
  • Deterministic builds; drop new installers in /downloads/
Preview rail Opt-in
For rehearsals & new features
  • Pectra rehearsals, MEV policy experiments
  • Feature flags visible in UI; rollback-ready
  • Keep verification steps identical to stable
Direct downloads
Links resolve to the /downloads/ directory; replace installers there when posting a new build.
Choose your platform; stable rail by default.
Apple logo
macOS
Universal .dmg

Apple Silicon & Intel. Sandboxed installer, notarised, ships with automatic update checks you can disable.

Signature: SHA-256 + Apple notarization Target: macOS 12+
Windows logo
Windows
.exe installer

Signed installer with optional portable mode for air-gapped or jump-box deployments.

Signature: SHA-256 + code-sign cert Target: Windows 10/11
Linux logo
Linux
AppImage

Static AppImage tested on Ubuntu, Debian and Fedora. Works in offline envs; no root required.

Signature: SHA-256 + GPG Target: glibc 2.31+
Operational posture
How Validator Tools behaves in the real world: predictable upgrades, explicit rollback paths and no surprises around keys or network use.
Environment & footprint

macOS 12+, Windows 10/11, Linux glibc 2.31+. 8 GB RAM, 2 vCPU, SSD. Prefer jump boxes or dedicated ops VMs with removable storage for audit trails and screenshots.

Network stance

No unsolicited telemetry; egress only to the consensus and execution endpoints you configure. Keep offline mirrors of installers and checksums for rehearsals and air-gapped flows.

Upgrade lane

Stable rail on a weekly rhythm. The previous installer is always a supported rollback target. Trial new flows on a staging validator or canary cluster before broad rollout.

Key discipline

Import validator keys only on trusted hosts. Back up slashing protection before migrations. Never expose keys or seed phrases in tickets, chats, recordings or screen shares.

Recovery & drills

Regularly rehearse restore from backup plus “last known good” installer. After each upgrade, confirm that alerts, dashboards and paging still fire as expected.

Support & escalation

For install issues, signature mismatches or odd validator behaviour, email hello@ethertool.org with OS, build name, hash used and a short timeline of events.