Encoding & Decoding
Encode or decode data in base64 streams.
Encode and decode in Base32 format.
Bitcoin-style encoding for compact data.
Convert between hex and binary/text.
Encode and decode percent-encoded URIs.
Parse query strings into visual structure.
Reveal hidden characters and control codes.
Convert legacy text encodings to ASCII.
Symmetric & Asymmetric
Encrypt and decrypt with AES-128/192/256.
Legacy DES and Triple DES encryption.
Public-key encryption and decryption.
Encrypt, decrypt, and manage PGP keys.
Sign and verify digital signatures.
Visualize Diffie-Hellman key exchange.
Generate cryptographically secure bytes.
Classic substitution ciphers (educational).
UUIDs, Passwords & Keys
Create unique identifiers from v1 to v7.
Inspect structure of any UUID value.
Generate sleek, compact NanoIDs.
Generate QR codes in bulk from CSV/Excel.
Forge secure API keys with custom rules.
Generate strong passwords by entropy.
Entropy-based password strength audit.
Visual map of password complexity.
Generate and validate MAC addresses.
Hashes & Entropy
MD5, SHA-1, SHA-256 and beyond.
Compare two digests for a match.
Test hash collision resistance visually.
Generate and verify bcrypt hashes.
Modern password hashing with Argon2.
Generate message authentication codes.
Verify HMAC signatures for authenticity.
PBKDF2 and key derivation functions.
Generate salts for encryption and hashing.
Measure randomness in sensitive strings.
Calculate CRC checksums for data.
Break secrets into verifiable shares.
Certificates & Integrity
Inspect certificate signing requests (PEM).
Explore public certificate fingerprints.
Validate certificate chain integrity.
Test SSL/TLS configuration and ciphers.
Decode and read public key files.
Validate file integrity by checksum.
JWTs, OAuth & 2FA
Decode and inspect JWT tokens.
Break down and annotate JWT fields.
Generate time-based 2FA codes.
Generate and read QR codes for secrets.
Step through token-based auth flows.