Generate passwords, hashes, UUIDs, and secure your data.
Create strong, secure passwords with customizable rules.
Generate MD5, SHA-1, SHA-256 hashes from text.
Generate secure SHA-256 hashes from text and files.
Analyze password security and get improvement suggestions.
Encrypt and decrypt text using AES-256 encryption.
Generate HMAC signatures for message authentication.
Generate secure random keys for APIs and encryption.
Calculate MD5, SHA-1, SHA-256, SHA-512 checksums for files.
Remove metadata from photos to protect your privacy. Strip GPS, camera info, and timestamps.
Check if your passwords have been exposed in known data breaches using k-Anonymity.
Verify SSL/TLS certificates, check expiration dates, and validate chain trust.
Analyze URLs for potential security threats and phishing indicators.
Check HTTP security headers for web applications and get improvement recommendations.
Create encrypted, self-destructing notes with password protection and expiration.
Scan DNS records for security configurations including SPF, DKIM, and DMARC.
Verify email domain security with SPF, DKIM, DMARC, and MTA-STS checks.
Generate PGP keys, encrypt messages, and decrypt content using RSA encryption.
Test and verify TOTP two-factor authentication codes from your authenticator app.
Decode, validate, and analyze JSON Web Tokens for security vulnerabilities.
Create and sign JSON Web Tokens with custom claims and algorithms.
Sanitize user input for HTML, SQL, XSS, and other security threats.
Analyze browser cookies for security attributes like Secure, HttpOnly, and SameSite.
Compare file or text hashes to verify integrity using SHA-256, SHA-512, and more.
Validate passwords against custom patterns, common passwords, and entropy requirements.
Analyze privacy policies for data collection, user rights, and compliance issues.
Visually design load balancer architectures and generate Nginx, HAProxy, and Caddy configuration files.
Calculate IPv4 subnet details including network address, broadcast, subnet mask, wildcard, and usable host range from CIDR notation.
Look up domain registration details including registrar, creation date, expiry, nameservers, and DNSSEC status.
Interactive reference for common TCP/UDP network ports with security ratings, filtering, and detailed notes.
Generate .reg files, PowerShell scripts, and batch files to control Windows Update behavior. Disable auto-updates, block restarts, manage driver updates.
Secure your digital life with our password generators, hash tools, and encryption utilities.
Can't find what you're looking for? Let us know and we'll consider adding it to this category.
Request a ToolGet Weekly Tools
Join 10,000+ users getting our tool updates.