Explore our complete collection of free cybersecurity tools.
Generate cryptographic hashes using MD5, SHA-1, SHA-256, SHA-512, and SHA-3 algorithms. All processing happens in your browser.
Paste any hash and automatically identify its type. Supports MD5, SHA-1, SHA-256, bcrypt, and many more formats.
Generate Hash-based Message Authentication Codes using SHA-256, SHA-512, and other algorithms with a secret key.
Test your password strength with entropy analysis, crack time estimates, and actionable security suggestions.
Generate cryptographically secure random passwords with customizable length, character types, and strength requirements.
Generate bcrypt password hashes with configurable salt rounds (4-16). Verify existing passwords against bcrypt hashes using secure server-side processing.
Generate time-based one-time passwords (TOTP) from a Base32 secret key. Features real-time countdown and auto-refresh every 30 seconds.
Decode PEM-encoded X.509 certificates to view subject, issuer, validity dates, signature algorithm, and extensions. All parsing happens in your browser.
Encrypt and decrypt text using the Caesar cipher with an adjustable shift amount. Includes ROT13 quick button and brute-force display of all 26 rotations.
Upload a file to calculate its checksum using SHA-256, SHA-512, SHA-1, and CRC32. Compare against expected hashes to verify file integrity.
Encrypt and decrypt data using AES-GCM or AES-CBC with configurable key sizes (128, 192, 256-bit). Generate keys and IVs, all client-side via Web Crypto API.
Generate signed JWT tokens with HMAC algorithms (HS256, HS384, HS512). Edit header and payload JSON, auto-fill common claims, all processed client-side.