Loading tool…
Loading tool…
Use these utilities to learn and debug: strength-check passwords, generate UUIDs, inspect tokens, and verify encoding. They are not a substitute for a full security audit or production key management.
Create strong random passwords with length and character options—use with your password manager.
Estimate password strength with heuristic feedback—learn what makes passphrases harder to guess.
Encode or decode Base64 text for debugging APIs, tokens, and data URIs—runs locally in your browser.
Compute MD5 and SHA-256 hashes for pasted text—useful for checksums and quick comparisons in development.
Generate random UUID v4 values in bulk for databases, APIs, and test data—copy with one click.
Inspect JWT header and payload (read-only). Does not verify signatures—use your auth stack for validation.
Percent-encode or decode text for query strings and `application/x-www-form-urlencoded` bodies.
Inspect PEM blocks: label, payload length, and a safe preview—useful for certs and keys in text form.
Compute HMAC-SHA256 or HMAC-SHA1 for a secret and message—debug webhooks and signed requests.
Decode PEM or DER certificates: subject, issuer, validity, serial, and extensions for TLS debugging.
Hash a password with bcrypt cost factors for learning—do not use for production secret storage as-is.