Security tools have an irony problem. Most online password checkers, encryption utilities, and SSL validators ask you to type or upload the exact data you're trying to protect — and then process it on their servers. You're trusting a third party with the secret you wanted to secure.
FindUtils takes a fundamentally different approach. All 30 security tools run entirely in your browser using client-side JavaScript. Your passwords, encryption keys, hashes, and domain scans never leave your device. There's no account to create, no data to upload, and no server storing your inputs. Close the tab and everything is gone.
The Password Generator creates cryptographically random passwords with configurable length, character sets (uppercase, lowercase, numbers, symbols), and exclusion rules. It uses the Web Crypto API — the same randomness source browsers use for TLS connections. Unlike browser-based generators from LastPass or 1Password, this one works without installing anything or creating an account.
The Password Strength Checker evaluates passwords against multiple criteria: length, character diversity, common patterns, dictionary words, and keyboard sequences. It estimates crack time for both online and offline attack scenarios. Critically, your password never leaves the browser — unlike sites like How Secure Is My Password (security.org), which could theoretically log inputs server-side.
The Password Breach Checker checks if your password has appeared in known data breaches using the Have I Been Pwned k-anonymity API. Only the first 5 characters of your password's SHA-1 hash are sent to the API — the full password and full hash never leave your browser. This is the same technique 1Password and Firefox Monitor use internally.
The Password Pattern Validator tests passwords against configurable policy rules: minimum length, required character types, maximum consecutive characters, and custom regex patterns. Useful for developers building registration forms who need to verify their validation logic matches their security policy.
The Text Encryption tool encrypts and decrypts text using AES-256-GCM — the same algorithm used by government agencies and financial institutions. Enter your plaintext and a passphrase; the tool produces encrypted output you can safely share. Decryption happens with the same passphrase. Everything runs in your browser via the Web Crypto API. No server ever sees your plaintext or key.
The PGP Encryption Tool handles PGP key generation, message encryption, and decryption entirely in the browser using OpenPGP.js. Generate RSA or ECC key pairs, encrypt messages with a recipient's public key, or decrypt messages with your private key. Your private key never leaves your device — unlike web-based PGP services like Keybase (now owned by Zoom) that store keys on their servers.
Hashing converts data into fixed-length fingerprints for integrity verification, password storage, and digital signatures. FindUtils provides five hashing tools:
| Tool | Algorithm | Use Case |
|---|---|---|
| SHA-256 Hash Generator | SHA-256 | File integrity, blockchain, modern password storage |
| MD5 Hash Generator | MD5 | Legacy checksums, non-security file verification |
| HMAC Generator | HMAC (SHA-256/512) | API authentication, message signing, webhook verification |
| File Hash Calculator | Multiple | Verify downloaded file integrity against published checksums |
| Hash Comparison Tool | Any | Compare two hash values for equality (timing-safe) |
The File Hash Calculator is particularly useful: drag in a downloaded file and instantly compute its SHA-256, SHA-512, or MD5 hash to verify against the publisher's checksum. No command line needed.
The Random Key Generator creates cryptographically secure random strings for API keys, tokens, encryption keys, and secrets. Configurable output formats include hex, base64, and alphanumeric. Uses crypto.getRandomValues() — not Math.random() — for true cryptographic randomness.
JWTs are the backbone of modern web authentication. FindUtils provides three specialized tools for working with them:
The JWT Decoder parses any JWT and displays its header, payload, and signature in a readable format. Paste a token and instantly see the algorithm, claims, expiration time, and issuer — without sending the token to any server. Unlike jwt.io (which processes tokens server-side and has had past security concerns about token logging), this runs entirely client-side.
The JWT Generator creates signed JWTs with custom claims, expiration times, and algorithms (HS256, HS384, HS512, RS256). Useful for testing API authentication during development.
The JWT Security Validator goes beyond decoding to audit a token's security posture: algorithm strength, expiration status, claim completeness, and known vulnerability patterns (like the alg: none attack). It flags weak configurations that could lead to token forgery.
The SSL Certificate Checker inspects any domain's SSL/TLS certificate: issuer, expiration date, certificate chain, protocol version, and cipher suite. It flags expired certificates, weak protocols (TLS 1.0/1.1), and misconfigured chains. Unlike Qualys SSL Labs (which queues requests and takes 2-3 minutes), this returns results in seconds.
The Security Headers Analyzer scans a website's HTTP response headers and grades its security posture. It checks for Content-Security-Policy, Strict-Transport-Security, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and Permissions-Policy. Each missing header gets a specific recommendation explaining the risk and the fix.
The DNS Lookup tool queries DNS records for any domain: A, AAAA, CNAME, MX, TXT, NS, SOA, and more. Useful for verifying DNS propagation, checking MX records for email delivery, and validating SPF/DKIM/DMARC records.
The DNS Security Scanner goes deeper, checking for DNSSEC status, open resolver vulnerabilities, zone transfer risks, and suspicious DNS configurations that could indicate hijacking or poisoning attempts.
The IP Address Lookup resolves IPs to geographic location, ISP, ASN, and reverse DNS. The URL Safety Checker scans URLs against known threat databases to detect phishing, malware distribution, and suspicious redirect chains.
The Cookie Analyzer inspects cookies set by any website and flags security issues: missing Secure flag, missing HttpOnly flag, overly broad Domain scope, SameSite misconfiguration, and excessive expiration times. Essential for GDPR/CCPA compliance audits and security reviews.
The Email Validator checks email addresses for syntax correctness, valid MX records, disposable email detection, and role-based address identification. Useful for cleaning email lists and preventing bounces.
The Email Security Checker audits a domain's email security configuration: SPF records, DKIM setup, DMARC policy, and MTA-STS support. Missing or misconfigured records mean your domain's emails can be spoofed.
The Phone Number Validator and E.164 Validator verify phone numbers against international formatting standards, detect carrier types (mobile, landline, VoIP), and validate country codes.
The Privacy Policy Generator creates GDPR and CCPA-compliant privacy policies based on your website's data practices. Answer questions about what data you collect, how you process it, and which third parties receive it — the tool generates a complete, legally-structured privacy policy. No lawyer fees for a baseline document.
The Privacy Policy Checker audits existing privacy policies against GDPR, CCPA, and COPPA requirements. Paste a privacy policy and it highlights missing required sections, vague language, and compliance gaps.
The Robots.txt Generator creates properly formatted robots.txt files with crawl directives, sitemap references, and crawler-specific rules. While not strictly a security tool, controlling what search engines index prevents sensitive pages from appearing in search results.
| Tool | What It Does |
|---|---|
| Secure Note Sharing | Create encrypted, self-destructing notes with view limits and expiration |
| 2FA Code Tester | Generate and validate TOTP codes for two-factor authentication testing |
| Data Sanitizer | Strip PII (emails, phone numbers, IPs, credit cards) from text before sharing |
| Feature | FindUtils (Free) | 1Password ($36/yr) | Bitwarden (Free) | NordPass ($18/yr) | Qualys SSL Labs (Free) |
|---|---|---|---|---|---|
| Price | $0 forever | $36/year | Free tier available | $18/year | Free |
| Account Required | No | Yes | Yes | Yes | No |
| Password Generator | Yes | Yes | Yes | Yes | No |
| Password Breach Check | Yes (k-anonymity) | Yes | Yes (premium) | Yes | No |
| SSL/TLS Analysis | Yes | No | No | No | Yes (slow) |
| JWT Tools | 3 tools | No | No | No | No |
| Encryption (AES/PGP) | Yes | Vault only | Vault only | Vault only | No |
| Hash Generation | 5 tools | No | No | No | No |
| Security Headers | Yes | No | No | No | Limited |
| Privacy Policy Tools | Generator + Checker | No | No | No | No |
| Data Processing | Client-side only | Cloud sync | Cloud sync | Cloud sync | Server-side |
The key difference: Password managers like 1Password and Bitwarden are excellent at what they do — storing passwords in encrypted vaults. But they don't cover the broader security toolkit: SSL checks, JWT debugging, hash generation, encryption, header analysis, or privacy compliance. FindUtils fills that gap with 30 specialized tools that process everything in your browser.
MD5 was designed for speed, which makes it terrible for password storage. Modern GPUs can compute billions of MD5 hashes per second. Use bcrypt, scrypt, or Argon2 for passwords. The MD5 Hash Generator is fine for file checksums and non-security integrity checks — just never for passwords.
Most websites ship without Content-Security-Policy, HSTS, or X-Frame-Options headers. These are free to implement and block entire categories of attacks (XSS, clickjacking, protocol downgrade). Run the Security Headers Analyzer against your site and fix the gaps — each takes one line in your web server config.
A JWT without an expiration claim (exp) is valid forever. If it leaks, an attacker has permanent access. Use the JWT Security Validator to audit your tokens for missing or overly long expiration times.
The average person reuses passwords across 5+ sites. When one site gets breached, attackers try those credentials everywhere (credential stuffing). Use the Password Generator to create a unique password for every account, and the Password Breach Checker to verify your existing passwords aren't already compromised.
Without email authentication records, anyone can send emails pretending to be your domain. The Email Security Checker tells you exactly which records you're missing and what to add. SPF, DKIM, and DMARC together block 99%+ of email spoofing attempts.
Q1: Are all 30 security tools really free? A: Yes. Every security tool on findutils.com is completely free — no signup, no trial period, no feature gates, and no ads. They work immediately in any modern browser.
Q2: Is it safe to type my password into an online strength checker? A: On findutils.com, yes. The Password Strength Checker processes your password entirely in your browser using JavaScript. It never transmits your password to any server. This is verifiable — open your browser's Network tab and you'll see zero outgoing requests while typing. Sites that process passwords server-side (even for "checking") represent a real risk.
Q3: How does the password breach checker work without sending my password? A: The Password Breach Checker uses k-anonymity: it hashes your password with SHA-1, sends only the first 5 characters of the hash to the Have I Been Pwned API, receives back all matching hashes, and checks for a match locally. Your full password and full hash never leave your browser. This is the same privacy-preserving technique used by 1Password and Firefox Monitor.
Q4: What's the best free SSL checker in 2026? A: For quick results, FindUtils' SSL Certificate Checker returns certificate details in seconds without queuing. Qualys SSL Labs provides the most comprehensive deep scan but takes 2-3 minutes per domain and queues during peak times. For daily checks and quick audits, FindUtils is faster; for annual deep audits, use both.
Q5: Can these tools replace a paid password manager? A: No — and they're not designed to. Password managers (1Password, Bitwarden) store and auto-fill your passwords across devices. FindUtils security tools are for generating passwords, checking if they're breached, encrypting messages, validating SSL, analyzing security headers, and auditing JWT tokens. They complement a password manager, not replace it.
Q6: Is client-side encryption actually secure? A: Yes, when implemented correctly. The Text Encryption tool uses the Web Crypto API (AES-256-GCM), which is the same cryptographic implementation your browser uses for HTTPS. The encryption key is derived from your passphrase using PBKDF2 with a random salt. The limitation is key management — you need to share the passphrase securely through a separate channel.
Q7: What should I check first when auditing a website's security? A: Start with three tools: (1) SSL Certificate Checker to verify valid HTTPS, (2) Security Headers Analyzer to find missing headers, and (3) Email Security Checker to verify email authentication records. These three checks cover the most common attack vectors: man-in-the-middle, XSS/clickjacking, and email spoofing.