Security & Privacy
Password generators, encryption tools, QR codes, and privacy utilities.
Password Generator
Generate strong, random passwords with customizable length, character sets, and complexity requirements.
Password Strength Checker
Analyze password strength with entropy scoring, crack-time estimates, and improvement suggestions.
Random String Generator
Create cryptographically random strings for API keys, tokens, salts, and unique identifiers.
QR Code Generator
Create QR codes for URLs, text, Wi-Fi credentials, vCards, and more with customizable size and colors.
QR Code Reader
Scan and decode QR codes from uploaded images or your device camera to extract embedded data.
File Checksum Calculator
Compute MD5, SHA-1, SHA-256, and SHA-512 checksums to verify file integrity and detect tampering.
Text Encryption / Decryption
Encrypt and decrypt text using AES-256, RSA, or other ciphers with password-based key derivation.
Secure Note / Self-Destructing Message Creator
Create encrypted, self-destructing messages with expiration timers and single-view access links.
Privacy Policy Generator
Generate a customizable privacy policy for your website or app covering GDPR, CCPA, and cookie disclosures.
Cookie Policy Generator
Build a compliant cookie policy detailing cookie types, purposes, and user consent options.
Password Vault (Local)
Encrypted password storage using AES-256 with a master password. All data in localStorage - zero-knowledge, no server.
Steganography Tool
Hide secret text messages inside images using LSB encoding. Upload an image to encode or decode hidden text.
Two-Factor Auth Tester
Generate TOTP codes from a secret key (RFC 6238). Verify codes and test your 2FA setup in real time.
GPS Location Remover
Strip GPS coordinates and location data from photos for privacy protection.
Image Steganography Tool
Hide and extract secret text messages within image files using LSB encoding.
Image Hash Calculator
Calculate perceptual hash, MD5, SHA-256, and other hashes of image files.
Passphrase Generator
Generate memorable passphrases from random words with customizable word count, separators, and capitalization.
PIN Code Generator
Generate random PIN codes of configurable length with options to avoid sequential or repeated digits.
Data Breach Password Checker
Check if a password has appeared in known data breaches using k-anonymity with the HIBP API hash prefix.
Encryption Key Generator
Generate random AES-128, AES-256, and RSA key pairs using the Web Crypto API for development and testing.
MD5 Hash Generator
Generate MD5 hash digests from text or file input using client-side cryptographic operations.
SHA-1 Hash Generator
Compute SHA-1 hash values from text or files entirely in the browser using the WebCrypto API.
SHA-256 Hash Generator
Generate SHA-256 cryptographic hash digests from text or file input using the WebCrypto API.
SHA-512 Hash Generator
Compute SHA-512 hash values from text or files with hex, base64, and binary output formats.
SHA-384 Hash Generator
Generate SHA-384 cryptographic hashes from text or file input using the WebCrypto API.
Bcrypt Hash Generator
Generate bcrypt password hashes with configurable cost factor and verify passwords against existing hashes.
Hash Identifier
Automatically detect and identify the type of a hash string (MD5, SHA-1, SHA-256, bcrypt, etc.) by analyzing its format.
Hash Verifier
Verify file or text integrity by comparing computed hash values against expected hash digests.
HMAC Generator
Generate HMAC (Hash-based Message Authentication Code) signatures using SHA-256, SHA-512, or SHA-1 with a secret key.
Checksum Calculator
Calculate MD5, SHA-1, SHA-256, and CRC32 checksums for files to verify download integrity.
File Hash Calculator
Compute cryptographic hash digests for files of any size using streaming WebCrypto operations with progress tracking.
AES Encryption Tool
Encrypt and decrypt text using AES-256-GCM with password-derived keys via PBKDF2, entirely in the browser.
RSA Encryption Tool
Generate RSA key pairs and encrypt/decrypt messages using RSA-OAEP with the WebCrypto API.
File Encryption Tool
Encrypt and decrypt files of any type using AES-256-GCM with password-based key derivation, processed entirely client-side.
Text Encryption & Decryption
Encrypt and decrypt text messages using multiple cipher algorithms including AES, ChaCha20, and Triple DES.
PGP Key Generator
Generate PGP/GPG public and private key pairs with configurable key size and algorithm using OpenPGP.js.
PGP Encryption Tool
Encrypt and decrypt messages using PGP public/private keys with OpenPGP.js, fully client-side.
PGP Signature Verifier
Verify PGP/GPG digital signatures against public keys and sign messages with private keys.
CSR Generator
Generate Certificate Signing Requests (CSR) with custom subject fields and RSA/EC key pairs in the browser.
CSR Decoder
Decode and inspect Certificate Signing Request (CSR) files to view subject, key details, and extensions.
PEM to DER Converter
Convert certificates and keys between PEM (Base64 text) and DER (binary) encoding formats.
Self-Signed Certificate Generator
Generate self-signed X.509 certificates with custom subject, validity period, and key algorithm for development use.
JWT Generator
Create and sign JSON Web Tokens with custom claims, expiration, and HMAC or RSA signing algorithms.
JWT Validator
Validate JWT signatures using HMAC secrets or RSA/EC public keys and check claim expiration and audience.
TOTP Code Generator
Generate Time-based One-Time Password codes from a secret key, compatible with Google Authenticator and Authy.
HOTP Code Generator
Generate HMAC-based One-Time Password codes from a secret key and counter value for two-factor authentication.
API Key Generator
Generate secure API keys and access tokens with configurable formats, prefixes, and cryptographic randomness.
Secret Key Generator
Generate cryptographically secure secret keys for JWT signing, HMAC, AES encryption, and other applications.
RSA Key Pair Generator
Generate RSA public/private key pairs with configurable key sizes (2048, 3072, 4096-bit) in PEM format.
ECDSA Key Pair Generator
Generate Elliptic Curve key pairs (P-256, P-384, P-521) for digital signatures and key exchange.
Ed25519 Key Generator
Generate Ed25519 key pairs for high-performance digital signatures and SSH authentication.
SSH Key Generator
Generate SSH key pairs (RSA, ECDSA, Ed25519) in OpenSSH format with optional passphrase protection.
SSH Key Fingerprint Calculator
Calculate the fingerprint of an SSH public key in MD5 and SHA-256 formats for verification.
HSTS Header Builder
Configure HTTP Strict Transport Security headers with preload eligibility checking and max-age recommendations.
Permissions Policy Builder
Build Permissions-Policy (formerly Feature-Policy) headers to control browser feature access for your site.
SRI Hash Generator
Generate Subresource Integrity hashes for script and link tags to prevent CDN tampering attacks.
Security Regex Pattern Library
Browse and test common security-focused regex patterns for input validation, XSS prevention, and SQL injection detection.
SQL Injection Tester
Test SQL injection patterns against simulated query builders to learn about SQL injection prevention techniques.
HTML Sanitizer Tester
Test HTML sanitization by comparing raw input against DOMPurify and browser-native sanitization output.
Encrypted Clipboard
Temporarily store encrypted text snippets in browser memory with auto-expiry and one-click secure copy.
Terms of Service Generator
Generate terms of service agreements customized to your business type, service model, and legal requirements.
Cookie Consent Generator
Generate a GDPR/CCPA-compliant cookie consent banner with customizable categories, styling, and JavaScript code.
Data Processing Agreement Generator
Generate a GDPR-compliant Data Processing Agreement (DPA) for data processor relationships.
CCPA Compliance Checker
Assess CCPA (California Consumer Privacy Act) compliance with an interactive questionnaire and action plan.
JWK Generator
Generate JSON Web Keys (JWK) and JWK Sets for RSA, EC, and symmetric key types used in JOSE/JWT.
JWK to PEM Converter
Convert between JSON Web Key (JWK) format and PEM-encoded public/private keys.
OAuth Token Inspector
Decode and inspect OAuth 2.0 access tokens, refresh tokens, and ID tokens to view claims and metadata.
SAML Decoder
Decode and inspect SAML assertions, requests, and responses with XML formatting and attribute extraction.
SAML Validator
Validate SAML XML documents against SAML 2.0 schema and check for common configuration errors.
Passphrase Generator
Generate memorable but secure passphrases using the Diceware method with customizable word count and separators.
Password Hash Checker
Verify passwords against bcrypt, scrypt, Argon2, and PBKDF2 hash strings to confirm they match.
JWT Claims Inspector
Extract and display JWT claims as formatted JSON with registered claim explanations and timestamp conversion.
htpasswd Generator
Generate Apache htpasswd entries with bcrypt, MD5, or SHA-1 password hashing for HTTP basic auth.
Browser Fingerprint Tester
Analyze your browser fingerprint uniqueness by testing canvas, WebGL, audio, font, and API-based fingerprinting vectors.
WebRTC Leak Tester
Test if your browser leaks your real IP address through WebRTC APIs even when using a VPN.
DNS Leak Tester
Test for DNS leaks that could expose your browsing activity when using a VPN or proxy service.
Browser Privacy Tester
Comprehensive privacy audit testing tracking protection, cookie handling, fingerprinting resistance, and API exposure.
Do Not Track Tester
Check if your browser sends Do Not Track (DNT) and Global Privacy Control (GPC) signals correctly.
EXIF Data Remover
Strip all EXIF metadata from photos to protect privacy before sharing, processed entirely in the browser.
Email Header Analyzer
Parse and analyze email headers to trace delivery path, check SPF/DKIM/DMARC, and detect spoofing indicators.
SPF Record Generator
Build SPF DNS records with an interactive tool to authorize email senders and prevent spoofing.
DKIM Record Generator
Generate DKIM key pairs and DNS TXT records for email authentication and anti-spoofing protection.
DMARC Record Generator
Build DMARC DNS records with policy configuration, reporting settings, and alignment mode selection.
URL Expander
Expand shortened URLs to reveal their final destination before clicking, with redirect chain display.
String Hash Generator
Generate multiple hash types (MD5, SHA-1, SHA-256, SHA-512) from a single text input for easy comparison.
PBKDF2 Key Derivation
Derive cryptographic keys from passwords using PBKDF2 with configurable iterations, salt, and hash algorithm.
Argon2 Hash Generator
Generate Argon2id password hashes with configurable memory, iterations, and parallelism parameters.
Scrypt Hash Generator
Generate scrypt password hashes with configurable CPU/memory cost parameters and salt generation.
Digital Signature Tool
Create and verify digital signatures using RSA-PSS or ECDSA with the WebCrypto API.
Entropy Calculator
Calculate Shannon entropy of text or data to measure randomness and information content in bits.
Secure Random Number Generator
Generate cryptographically secure random numbers within custom ranges using the Web Crypto API.
Secure File Shredder
Overwrite file contents with random data before deletion to prevent recovery, using client-side processing.
ASN.1 Decoder
Decode ASN.1/DER encoded data into a human-readable tree structure for certificate and key inspection.
PKCS#12 / PFX Converter
Convert between PKCS#12 (.pfx/.p12) and PEM format certificates and private keys.
OpenSSL Command Generator
Generate OpenSSL commands for common operations like CSR creation, certificate conversion, and key generation.
SSL/TLS Config Generator
Generate secure SSL/TLS configuration for Apache, Nginx, and HAProxy with modern cipher suite recommendations.
Cipher Suite Reference
Browse and search TLS cipher suites with security ratings, protocol compatibility, and recommendation status.
Password Exposure Checker
Check if a password has been exposed in data breaches using k-anonymity hash prefix matching via HIBP.
Security Checklist Generator
Generate customized web application security checklists based on your tech stack, deployment, and compliance needs.
OWASP Top 10 Reference
Interactive reference for OWASP Top 10 vulnerabilities with examples, mitigations, and code snippets.
CVE Lookup Tool
Search and browse Common Vulnerabilities and Exposures entries with severity scores and affected products.
Encryption Strength Calculator
Calculate the brute-force resistance of encryption keys by key length, algorithm, and estimated attacker capability.
Secure Password Sharing
Generate encrypted one-time links for sharing passwords securely with AES-256-GCM encryption in URL fragments.
Secret Message Encoder
Encode messages using various methods including zero-width characters, invisible ink Unicode, and whitespace encoding.
2FA Backup Code Generator
Generate secure backup/recovery codes for two-factor authentication with configurable format and quantity.
TOTP QR Code Generator
Generate QR codes for TOTP authenticator app setup with configurable issuer, account, and algorithm parameters.
OpenVPN Config Generator
Generate OpenVPN client and server configuration files with customizable encryption, routing, and DNS settings.
WireGuard Config Generator
Generate WireGuard VPN configuration files with key pair generation and peer configuration.
Firewall Rule Generator
Generate firewall rules for iptables, nftables, UFW, and Windows Firewall with an interactive rule builder.
IP ACL Builder
Build IP access control lists for web servers and firewalls with CIDR support and rule ordering.
JWT RS256 Key Generator
Generate RSA key pairs specifically formatted for JWT RS256 signing with PEM and JWK output.
Hash Comparison Tool
Compare two hash values side-by-side with visual highlighting of matching and differing characters.
OTP URI Parser
Parse and validate otpauth:// URIs used by authenticator apps to extract TOTP/HOTP configuration parameters.
GPG Key Analyzer
Parse and analyze GPG/PGP public keys to display key ID, fingerprint, user IDs, subkeys, and expiration.
X.509 Certificate Builder
Build X.509 certificates with custom extensions, SANs, key usage, and extended key usage fields.
Certificate Key Matcher
Verify that a certificate and private key match by comparing their public key modulus fingerprints.
XOR Cipher Tool
Apply XOR cipher operations with single-byte and multi-byte keys with hex input/output and key analysis.
Hash Rate Calculator
Calculate brute-force attack times based on hash rate, password complexity, and character set size.
Secure Headers Scanner
Scan a website's HTTP response headers and grade its security posture with actionable improvement suggestions.
Data Masking Tool
Mask sensitive data (emails, phone numbers, credit cards, SSNs) in text with configurable masking patterns.
PII Detector
Detect personally identifiable information (emails, phones, SSNs, addresses) in text using pattern matching.
Credit Card Validator
Validate credit card numbers using the Luhn algorithm with card network detection and BIN lookup.
Cryptographic Key Inspector
Paste any cryptographic key (RSA, EC, Ed25519) to inspect key type, size, curve, and public key components.
Secret Scanner
Scan text or code for accidentally exposed secrets like API keys, tokens, passwords, and private keys using pattern matching.
Code Obfuscator
Obfuscate JavaScript code to make it harder to reverse-engineer with variable renaming and control flow transformations.
Key Derivation Calculator
Derive cryptographic keys from passwords using PBKDF2, HKDF, and scrypt with configurable parameters.
SHA-3 Hash Generator
Generate SHA-3 (Keccak) hash values in SHA3-224, SHA3-256, SHA3-384, and SHA3-512 variants.
BLAKE2 Hash Generator
Generate BLAKE2b and BLAKE2s hash values with configurable digest length and key parameters.
RIPEMD-160 Hash Generator
Generate RIPEMD-160 hash values from text or file input, commonly used in Bitcoin address derivation.
PGP Keyserver Search
Search public PGP keyservers for encryption keys by email, name, or key ID via public APIs.
Encrypted QR Code Generator
Generate QR codes containing AES-encrypted data that requires a password to decode the embedded message.
Privacy Risk Assessor
Evaluate the privacy risk of your website or app by answering questions about data collection and processing practices.
DPIA Template Generator
Generate Data Protection Impact Assessment templates with risk matrices and mitigation planning sections.
Incident Response Template Generator
Generate security incident response plan templates customized to your organization type and compliance requirements.
security.txt Generator
Generate RFC 9116 compliant security.txt files with contact, encryption, acknowledgments, and policy fields.
CAA Record Generator
Generate DNS CAA records to control which Certificate Authorities can issue certificates for your domain.
Email Security Checker
Check a domain's email security setup by looking up SPF, DKIM, DMARC, and MTA-STS DNS records.
MTA-STS Policy Generator
Generate MTA-STS policy files and DNS records to enforce TLS for incoming email connections.
BIMI Record Generator
Generate Brand Indicators for Message Identification DNS records to display your logo in email clients.
Encryption Benchmark
Benchmark WebCrypto API encryption and hashing performance in your browser across different algorithms and key sizes.
Permissions Policy Generator
Build Permissions-Policy HTTP headers to control browser feature access for camera, microphone, and geolocation.
Referrer Policy Generator
Select and configure the optimal Referrer-Policy header with comparison of all policy options and their effects.
Text Encryption / Decryption
Encrypt and decrypt text using AES, DES, and other algorithms with key and IV configuration options.
RSA Key Pair Generator
Generate RSA public/private key pairs using the Web Crypto API with configurable key sizes.
CSR Generator
Generate Certificate Signing Requests with organization, domain, and key information using Web Crypto API.
AES Encryption / Decryption
Encrypt and decrypt files or text with AES-128, AES-192, or AES-256 in CBC, CTR, or GCM mode using Web Crypto API.
RSA Key Pair Generator
Generate RSA-2048, RSA-3072, or RSA-4096 key pairs in PEM format for signing and encryption, entirely in-browser.
ChaCha20-Poly1305 Encryption
Encrypt and decrypt data using ChaCha20-Poly1305 AEAD cipher with authenticated encryption and nonce management.
File Encryption / Decryption
Encrypt any file with AES-256-GCM and a password-derived key. Download the encrypted blob or decrypt it back.
RSA Encrypt / Decrypt Tool
Encrypt short messages with an RSA public key and decrypt with the private key using OAEP padding.
XOR Cipher Tool
Apply XOR cipher to text or binary data with a repeating key. Visualize bitwise operations step by step.
Vigenere Cipher Encoder / Decoder
Encode and decode messages using the Vigenere polyalphabetic cipher with frequency analysis and key-length detection.
Caesar Cipher with Brute-Force
Encrypt and decrypt with Caesar shift cipher. Includes brute-force attack showing all 26 rotations simultaneously.
One-Time Pad Generator
Generate cryptographically random one-time pads and encrypt messages with provably unbreakable XOR encryption.
Enigma Machine Simulator
Interactive Enigma machine simulation with configurable rotors, reflectors, and plugboard. Encrypt messages like WWII operators.
SHA-3 / Keccak Hash Generator
Compute SHA3-224, SHA3-256, SHA3-384, SHA3-512, and SHAKE hashes for text or files using the Keccak sponge construction.
BLAKE2 / BLAKE3 Hash Generator
Generate BLAKE2b, BLAKE2s, and BLAKE3 hashes for text or files. Compare speeds against SHA-256 in real time.
Argon2 Key Derivation Tool
Derive keys from passwords using Argon2id with configurable memory cost, time cost, and parallelism parameters.
PBKDF2 Key Derivation Tool
Derive cryptographic keys from passwords using PBKDF2 with SHA-256 or SHA-512 and configurable iteration counts.
scrypt Key Derivation Tool
Derive keys using scrypt with configurable N, r, p parameters. Visualize memory-hardness and compare with PBKDF2.
bcrypt Hash Generator & Verifier
Generate bcrypt password hashes with configurable cost factor and verify passwords against existing hashes.
HMAC Generator & Verifier
Compute HMAC-SHA256, HMAC-SHA384, HMAC-SHA512 message authentication codes for text or files and verify signatures.
Hash Type Identifier
Paste any hash and automatically identify its type (MD5, SHA-1, SHA-256, bcrypt, Argon2, etc.) by format and length.
CRC-32 Checksum Calculator
Compute CRC-32, CRC-16, and Adler-32 checksums for text or file data with polynomial configuration options.
Hash Speed Comparison Benchmark
Benchmark hash functions (MD5, SHA-1, SHA-256, SHA-3, BLAKE3) in your browser and compare throughput in real time.
ECDSA Digital Signature Tool
Sign and verify messages with ECDSA using P-256, P-384, or P-521 curves via Web Crypto API.
RSA-PSS Signature Tool
Sign documents with RSA-PSS and verify signatures. Supports RSA-2048 through RSA-4096 key sizes.
Ed25519 Signature Tool
Generate Ed25519 key pairs, sign messages, and verify signatures using the EdDSA algorithm with Curve25519.
PGP / GPG Key Pair Generator
Generate OpenPGP key pairs (RSA or ECC) with user ID, expiration, and passphrase protection. Export as ASCII-armored text.
PGP Encrypt / Decrypt Messages
Encrypt messages with a PGP public key and decrypt with the private key. Supports ASCII-armored input and output.
PGP Sign & Verify Messages
Create PGP cleartext signatures and verify signed messages against a public key. Detached signature support included.
Code Signing Verifier
Verify code signatures and integrity hashes for downloaded files. Compare expected vs. computed SHA-256 digests.
SSH Key Pair Generator
Generate SSH key pairs (RSA, Ed25519, ECDSA) with configurable bit length. Download public and private keys.
SSH Key Fingerprint Calculator
Compute MD5 and SHA-256 fingerprints for SSH public keys. Verify server key authenticity visually.
ECDH Key Exchange Simulator
Simulate Elliptic Curve Diffie-Hellman key exchange between two parties. Visualize the shared secret derivation process.
Diffie-Hellman Key Exchange Visualizer
Interactive visualization of classical Diffie-Hellman key exchange with color-mixing analogy and modular arithmetic steps.
API Key Generator
Generate cryptographically secure API keys with configurable prefixes, lengths, and character sets. Copy-ready output.
Encryption Key Manager (Local)
Store and organize encryption keys locally with labels, expiry dates, and key type metadata. All data in IndexedDB.
PEM File Parser & Inspector
Parse PEM-encoded certificates, keys, and CSRs. Display algorithm, key size, subject, issuer, and validity details.
JWK / PEM Key Converter
Convert between JWK (JSON Web Key) and PEM formats for RSA and EC keys. Supports PKCS#8 and SPKI formats.
JWT Signature Verifier
Verify JWT signatures with HMAC, RSA, or ECDSA keys. Check expiration, issuer, audience, and custom claim validation.
JWT Debugger & Inspector
Decode and inspect JWT headers, payloads, and signatures with syntax highlighting and human-readable timestamps.
OAuth 2.0 Flow Debugger
Debug OAuth 2.0 authorization code, implicit, and PKCE flows. Inspect tokens, scopes, and redirect parameters.
SAML Assertion Decoder
Decode and inspect SAML assertions and responses. View XML attributes, conditions, and signature details.
CSRF Token Generator
Generate cryptographically secure CSRF tokens with configurable entropy. Includes HTML form snippet and cookie-based patterns.
Opaque Token Generator
Generate URL-safe, Base64, or hex-encoded opaque bearer tokens with selectable entropy (128-512 bits).
Shamir Secret Sharing Tool
Split a secret into N shares where any K shares can reconstruct it. Uses polynomial interpolation over a finite field.
Visual Secret Sharing (Image Split)
Split an image into visual cryptographic shares that reveal the secret only when overlaid. Based on Naor-Shamir scheme.
Zero-Knowledge Proof Demo
Interactive demonstration of zero-knowledge proofs. Prove you know a secret without revealing it using graph coloring and cave analogy.
Cryptographic Commitment Scheme
Create binding commitments to values using hash-based commitment schemes. Reveal and verify later without trust.
Secret Key Escrow Manager
Split master keys into escrow shares for disaster recovery. Assign custodians and track share distribution.
Browser Fingerprint Tester
Analyze your browser fingerprint including canvas, WebGL, audio context, fonts, and navigator properties. See how unique you are.
Website Tracker Detector
Scan page source for known tracking pixels, analytics scripts, and third-party beacons. Identify all trackers on a page.
Canvas Fingerprint Defender
Test and demonstrate canvas fingerprinting techniques. Generate noise-injected canvas to show how defenders work.
WebRTC Leak Tester
Detect WebRTC IP leaks that can expose your real IP address even behind a VPN. Shows local, public, and ICE candidates.
DNS Leak Tester
Test for DNS leaks that might reveal your browsing activity to your ISP despite using a VPN or proxy.
Privacy Score Checker
Get an overall privacy score for your browser setup based on fingerprint uniqueness, leak tests, and security headers.
Do Not Track / GPC Signal Tester
Check if your browser sends Do Not Track (DNT) and Global Privacy Control (GPC) signals and whether sites respect them.
Third-Party Cookie Tester
Test whether your browser blocks third-party cookies. Explains implications for tracking and privacy.
Document Metadata Privacy Scanner
Scan PDFs, images, and Office files for hidden metadata including author, GPS, edit history, and embedded comments.
Anonymous Identity Generator
Generate realistic but fake identities for testing forms and signups. Names, addresses, emails - all synthetic data.
IP Address Lookup & Geolocation
Look up your current IP address with geolocation, ASN, ISP, and reverse DNS information displayed on a map.
Subnet Calculator
Calculate subnet masks, network addresses, broadcast addresses, and host ranges for IPv4 and IPv6 CIDR blocks.
CIDR Range Calculator & Visualizer
Visualize CIDR blocks, calculate IP ranges, and check if addresses fall within subnets. Supports IPv4 and IPv6.
IPv6 Address Expander / Compressor
Expand shortened IPv6 addresses to full form and compress verbose addresses. Validate and analyze IPv6 notation.
IP Range Merger & Optimizer
Merge overlapping IP ranges, aggregate CIDR blocks, and minimize firewall rules. Supports allow/deny list optimization.
DNS Record Lookup
Query A, AAAA, MX, TXT, CNAME, NS, SOA, and SRV records for any domain using DNS over HTTPS.
DNS Propagation Checker
Check DNS propagation across global resolvers. See if your DNS changes have propagated to servers worldwide.
SPF Record Checker & Builder
Validate SPF records for email authentication. Build new records with include, ip4, ip6, and redirect mechanisms.
DKIM Record Checker
Look up and validate DKIM DNS records for email domain authentication. Verify selector, key type, and key data.
DMARC Record Checker & Builder
Check DMARC records for email security. Build policies with reject/quarantine/none, reporting URIs, and alignment modes.
MX Record Checker & Priority Viewer
Look up MX records for any domain to see mail server priorities, verify mail routing, and detect misconfigurations.
Network Port Reference & Scanner
Reference database of common TCP/UDP ports with service names. Test port connectivity to your own servers.
Permissions Policy Generator
Build Permissions-Policy headers to control browser features like camera, microphone, geolocation, and payment APIs.
Referrer Policy Tester
Test and configure Referrer-Policy headers. Visualize which referrer information is sent for different policy values.
X-Frame-Options & Clickjacking Tester
Test X-Frame-Options and CSP frame-ancestors directives. Demonstrate clickjacking attacks and defenses.
Cookie Consent Compliance Scanner
Scan a site for cookie consent compliance. Check if cookies are set before consent and categorize by purpose.
Session Token Entropy Analyzer
Analyze session token randomness and entropy. Detect patterns, weak PRNGs, and predictable session identifiers.
SSL Certificate Chain Viewer
Visualize the complete SSL certificate chain from leaf to root CA. Check chain completeness and intermediate certificates.
CSR (Certificate Signing Request) Generator
Generate Certificate Signing Requests with subject fields, key type selection, and SAN (Subject Alternative Names).
Self-Signed Certificate Generator
Generate self-signed X.509 certificates for development and testing. Configure validity period, key usage, and SANs.
SQL Injection Pattern Tester
Test SQL injection patterns in a local sandbox. Practice detection and learn about parameterized queries.
SRI (Subresource Integrity) Hash Generator
Generate Subresource Integrity hashes for script and link tags. Paste a CDN URL or file to compute sha256/sha384/sha512.
security.txt Generator
Generate a standards-compliant security.txt file (RFC 9116) with contact, encryption, acknowledgments, and policy fields.
Website Technology Detector
Detect technologies used by a website: frameworks, CMS, analytics, CDN, hosting, and server software from client-side signals.
URL Safety Scanner
Analyze URLs for phishing indicators: homograph attacks, suspicious TLDs, URL shortener chains, and known malicious patterns.
Phishing URL Pattern Detector
Detect phishing URLs using heuristics: IDN homograph detection, brand impersonation, suspicious subdomains, and path analysis.
URL Unshortener & Redirect Tracer
Expand shortened URLs (bit.ly, t.co, etc.) and trace the full redirect chain to see the final destination safely.
IDN Homograph Attack Detector
Detect internationalized domain name (IDN) homograph attacks using confusable Unicode characters that mimic ASCII domains.
Email Header Analyzer
Parse and analyze email headers to trace message routing, verify SPF/DKIM/DMARC authentication, and detect spoofing.
Safe Link Preview Generator
Generate a safe preview of any URL showing its title, description, and screenshot without visiting it directly.
Malware Hash Checker
Check file hashes (MD5, SHA-1, SHA-256) against known malware databases. Upload a file to compute and verify its hash.
YARA Rule Builder
Build YARA rules visually with string patterns, hex patterns, and conditions. Export rules for malware detection scanning.
IOC (Indicator of Compromise) Extractor
Extract IOCs from threat reports: IP addresses, domains, URLs, file hashes, email addresses, and Bitcoin wallets.
Threat Intelligence Feed Parser
Parse STIX/TAXII, CSV, and JSON threat intelligence feeds. Normalize IOCs and export in standard formats.
MITRE ATT&CK Navigator
Interactive MITRE ATT&CK matrix viewer. Map techniques to tactics, highlight coverage, and export layer files.
CVE Lookup & Details Viewer
Search for Common Vulnerabilities and Exposures (CVE) by ID. View CVSS scores, descriptions, and affected products.
CVSS Score Calculator
Calculate CVSS v3.1 and v4.0 vulnerability scores with the full base, temporal, and environmental metric groups.
Canary Token Generator
Generate honeypot tokens (URLs, DNS names, email addresses, files) that alert you when accessed by an attacker.
Honeypot Detector
Analyze network responses and service banners to detect honeypots. Identify telltale signs of deception infrastructure.
Security Log Analyzer
Parse and analyze security logs (Apache, Nginx, auth.log). Detect brute force attempts, anomalies, and suspicious patterns.
Apache / Nginx Log Parser
Parse Apache Combined and Nginx access logs. Visualize top IPs, URIs, status codes, and user agents with charts.
JSON Log Viewer & Filter
View and filter JSON-structured logs with search, time range selection, severity filtering, and field extraction.
Syslog Message Parser
Parse RFC 3164 and RFC 5424 syslog messages. Extract facility, severity, timestamp, hostname, and message fields.
User Agent String Analyzer
Parse and analyze user agent strings to identify browser, OS, device type, and bot/crawler signatures.
Timestamp Forensics Tool
Convert and analyze timestamps from various formats (Unix, Windows FILETIME, NTFS, HFS+) for digital forensics.
Hex Dump Viewer
View files as hex dumps with ASCII representation. Search for patterns, identify file magic bytes, and analyze binary data.
Base64 File Analyzer
Decode Base64 strings to reveal hidden file types. Detect embedded images, scripts, and binary data in encoded strings.
Incident Response Checklist Generator
Generate customizable incident response checklists based on NIST 800-61 phases: preparation, detection, containment, recovery.
Incident Timeline Builder
Build visual timelines for security incidents. Add events with timestamps, categories, and evidence references.
Data Breach Notification Template
Generate GDPR/CCPA-compliant data breach notification letters. Customize affected data types, timeline, and remediation steps.
Evidence Hash Chain Builder
Build a tamper-evident hash chain for digital evidence. Each file gets a timestamped hash linked to the previous entry.
ReDoS (Regex DoS) Tester
Test regular expressions for catastrophic backtracking vulnerabilities. Measure execution time with adversarial inputs.
Sensitive Data Regex Library
Library of regex patterns for detecting SSNs, credit cards, API keys, passwords, and PII in text. Test patterns on sample data.
Hex Encoder / Decoder
Convert text to hexadecimal and back. Supports ASCII, UTF-8, and raw binary hex with delimiter options.
Punycode / IDN Converter
Convert between Unicode domain names and Punycode (xn--) representations. Detect homograph attack attempts.
ROT13 / ROT47 Encoder
Apply ROT13 (letters only) or ROT47 (all printable ASCII) rotation ciphers. Instant encode/decode toggle.
HTML Sanitizer & XSS Cleaner
Sanitize HTML input by removing dangerous tags, attributes, and event handlers. Preview safe output in an isolated iframe.
JavaScript Deobfuscator
Deobfuscate packed and obfuscated JavaScript code. Detect eval-based packers, hex encoding, and string rotation.
Entropy Analyzer
Calculate Shannon entropy of text, files, or byte sequences. Visualize entropy distribution to detect encrypted or compressed data.
Cryptographic Random Number Generator
Generate cryptographically secure random numbers using Web Crypto API. Supports integer ranges, floats, and byte arrays.
Diceware Passphrase Generator
Generate strong passphrases using the Diceware method with EFF word lists. Estimate entropy and crack time.
UUID v7 Generator & Inspector
Generate time-ordered UUID v7 tokens (RFC 9562) and inspect existing UUIDs to extract timestamps and random bits.
NanoID Generator
Generate compact, URL-safe unique IDs with NanoID algorithm. Configure alphabet, length, and collision probability display.
TCP Flag Calculator
Calculate TCP flag values (SYN, ACK, FIN, RST, PSH, URG) from decimal, hex, or binary. Visualize flag combinations.
IP Header Decoder
Decode IPv4 and IPv6 packet headers from hex dumps. Visualize fields: version, TTL, protocol, source/destination.
MAC Address Lookup & Generator
Look up MAC address vendor (OUI) information. Generate random MAC addresses with optional vendor prefix.
Network Bandwidth Calculator
Calculate data transfer times, bandwidth requirements, and throughput. Convert between Mbps, MB/s, and transfer durations.
Network Latency Tester
Measure round-trip latency to endpoints using fetch timing API. Graph latency over time and compute statistics.
PCAP Summary Viewer
Upload PCAP files and view packet summaries: protocol distribution, top talkers, connection pairs, and flow statistics.
Firewall Rule Builder
Build firewall rules visually for iptables, nftables, and cloud security groups. Export as commands or JSON configs.
ACL / Permission Calculator
Calculate Unix file permissions (chmod), AWS IAM policies, and Kubernetes RBAC rules. Visualize access matrices.
Nginx Security Config Generator
Generate secure Nginx server blocks with TLS, HSTS, CSP, rate limiting, and access control configurations.
Apache Security Config Generator
Generate secure Apache .htaccess and httpd.conf snippets for TLS, headers, mod_security, and access control.
Data Masking Tool
Mask sensitive data in text: credit cards, SSNs, emails, phone numbers, and names. Configurable masking patterns.
Text Anonymizer
Anonymize text by replacing personal names, addresses, phone numbers, and emails with placeholder tokens.
Synthetic Data Generator
Generate realistic synthetic datasets that preserve statistical properties without containing real personal information.
CCPA / CPRA Compliance Checker
Assess CCPA/CPRA compliance for California consumer privacy. Evaluate disclosure, opt-out, and deletion requirements.
DPIA Template Generator
Generate Data Protection Impact Assessment templates with risk matrices, necessity analysis, and mitigation measures.
Security Asset Inventory Tracker
Track IT assets with security metadata: OS versions, patch levels, ownership, and classification. Export inventory reports.
Encrypted Clipboard
Encrypt clipboard text with a passphrase before sharing. Recipient decrypts with the same passphrase. Zero-server design.
Dead Drop Encrypted Message
Create encrypted messages encoded as URL fragments. The secret never touches a server - decryption happens locally.
Secure File Drop (Encrypted)
Encrypt a file with a password and generate a download link containing the encrypted payload as a data URL.
Signal Protocol Visualizer
Interactive visualization of the Signal/Double Ratchet protocol. Step through key exchanges, ratchet advances, and message encryption.
age File Encryption Tool
Encrypt and decrypt files using the age encryption format. Support for passphrase and X25519 recipient keys.
Ethereum Address Validator
Validate Ethereum addresses with EIP-55 checksum verification. Detect invalid addresses and mixed-case checksums.
Bitcoin Address Validator
Validate Bitcoin addresses (P2PKH, P2SH, Bech32, Bech32m). Detect address type and check Base58/Bech32 checksums.
BIP-39 Mnemonic Seed Generator
Generate BIP-39 mnemonic seed phrases (12/24 words) with entropy validation. Verify existing mnemonics and compute seeds.
Merkle Tree Visualizer
Build and visualize Merkle trees from data blocks. Demonstrate proof verification and tamper detection visually.
Local Blockchain Simulator
Interactive blockchain simulator: mine blocks, add transactions, visualize hashing, and demonstrate proof-of-work concepts.
TOTP Secret Key Generator
Generate TOTP secret keys with QR codes for authenticator apps. Configure period, digits, and algorithm (SHA-1/SHA-256/SHA-512).
HOTP Counter-Based Code Generator
Generate HOTP (HMAC-based One-Time Password) codes with counter-based increments per RFC 4226.
WebAuthn / FIDO2 Debugger
Test WebAuthn registration and authentication flows. Inspect attestation objects, assertions, and credential details.
Passkey Compatibility Tester
Test your browser and device support for passkeys (WebAuthn). Check platform authenticator and cross-platform capabilities.
OAuth PKCE Code Challenge Generator
Generate PKCE code_verifier and code_challenge pairs for OAuth 2.0 authorization code flow with S256 method.
Basic Auth Header Generator
Generate and decode HTTP Basic Authentication headers (Base64 user:password). Includes cURL command output.
Bearer Token Tester
Test API endpoints with bearer tokens. Send authenticated requests and inspect response headers and status codes.
.env File Validator
Validate .env files for syntax errors, missing required variables, duplicate keys, and exposed secrets.
Secret Scanner for Code
Scan code snippets for accidentally committed secrets: API keys, tokens, passwords, and private keys.
Git Diff Secret Finder
Paste git diffs and detect leaked credentials, tokens, and secrets using pattern-matching rules.
Dockerfile Security Scanner
Scan Dockerfiles for security issues: running as root, hardcoded secrets, missing health checks, and insecure base images.
Kubernetes RBAC Analyzer
Analyze Kubernetes RBAC configurations (Roles, ClusterRoles, Bindings) for overly permissive or risky access grants.
Terraform Security Scanner
Scan Terraform HCL files for security misconfigurations: open security groups, public S3 buckets, and missing encryption.
GitHub Actions Security Checker
Analyze GitHub Actions workflows for security risks: script injection, unpinned actions, and secret exposure.
Terms of Service Generator
Generate customizable Terms of Service agreements covering liability, intellectual property, termination, and dispute resolution.
Data Processing Agreement Generator
Generate GDPR-compliant Data Processing Agreements (DPA) with sub-processor lists, security measures, and data transfer terms.
Cookie Banner Code Generator
Generate cookie consent banner HTML/CSS/JS with consent categories, preference storage, and GDPR-compliant flows.
Block Cipher Mode Visualizer
Visualize how ECB, CBC, CTR, GCM, and OFB modes work with animated block diagrams showing IV, chaining, and feedback.
Elliptic Curve Cryptography Visualizer
Interactive visualization of elliptic curves showing point addition, scalar multiplication, and ECDH key exchange.
AES Round Function Visualizer
Step through AES encryption rounds: SubBytes, ShiftRows, MixColumns, and AddRoundKey with state matrix visualization.
Public Key Cryptography Explainer
Interactive explainer of public key cryptography concepts: key generation, encryption, signing, and the math behind RSA.
OWASP Top 10 Interactive Reference
Interactive reference for OWASP Top 10 vulnerabilities with descriptions, examples, mitigations, and code samples.
Cipher Suite String Explainer
Decode TLS cipher suite names (e.g., TLS_AES_128_GCM_SHA256) into human-readable components: key exchange, cipher, and hash.
Security Acronym Glossary
Searchable glossary of 500+ cybersecurity acronyms and terms with definitions, related concepts, and RFC references.
ASN.1 / DER Decoder
Decode ASN.1 structures in DER or BER encoding. Visualize the TLV (Tag-Length-Value) tree for certificates and keys.
Bitwise Operation Calculator
Perform AND, OR, XOR, NOT, shifts, and rotations on binary, hex, or decimal values. Visualize bit patterns.
Prime Number Tester & Generator
Test primality using Miller-Rabin algorithm. Generate large primes for cryptographic key generation.
Modular Arithmetic Calculator
Perform modular exponentiation, GCD, modular inverse, and Chinese Remainder Theorem calculations for cryptography.