Hash, encrypt, sign and decode — SHA256, Bcrypt, JWT, RSA
All 15 security tools run entirely inside your browser using WebCrypto and JavaScript cryptography libraries. Your keys, passwords and sensitive data are never transmitted to any server. From hashing and encryption to SSH key generation, certificate inspection, JWT tokens and 2FA codes, every common developer security task is covered.
Generate UUID v1, v4, v5 in bulk
Hash text with SHA-1/256/384/512, compute HMAC signatures, and hash/verify passwords with Bcrypt
Generate secure passwords with custom options and evaluate password strength with entropy and crack-time analysis
Decode and inspect JWT tokens
Generate and sign JWT tokens
Generate RSA, RSA-PSS and ECDSA public/private key pairs in PEM format
Generate RFC 6238 TOTP / Google Authenticator codes from a Base32 secret. Live countdown timer, configurable step and digit count.
Generate Ed25519 and RSA SSH key pairs in your browser. Outputs public key in authorized_keys format and private key in OpenSSH format.
Decode and inspect PEM X.509 certificates in your browser. Shows subject, issuer, validity, SANs, serial number and key details.
Generate Apache/Nginx .htpasswd password file entries using Bcrypt, SHA-1 or plain text — entirely in your browser.
AES-256-GCM encryption and decryption with password-based key derivation (PBKDF2)
Calculate CRC32 checksums for any input text in hex, decimal and binary
Generate secure secret keys for Django, Flask, JWT, API keys, URL-safe and passwords
Generate and verify bcrypt password hashes in your browser — configurable salt rounds (4–14). Uses bcryptjs, nothing leaves your device.
Generate HMAC-SHA256 message authentication codes — paste a message and secret key to produce a hex digest for API signing and integrity checks.
This collection covers hashing, symmetric and asymmetric encryption, token inspection, password tools and more. All 15 tools run 100% client-side — no server round-trips, no uploads, no account required. Cryptographic operations use the browser's built-in WebCrypto API or battle-tested WASM libraries for maximum accuracy.
QIs my data sent to a server?
No. All cryptographic operations run in your browser using the WebCrypto API or WASM libraries. Nothing you enter is ever transmitted.
QCan I use these tools for production secrets?
Yes — the algorithms are standard (SHA-256, AES-256-GCM, RSA-2048) and the implementations use the browser's native WebCrypto API. Always review security-critical decisions with a qualified engineer.
QCan the JWT decoder verify a signature?
The JWT decoder decodes and displays header and payload without verifying the signature. Use the JWT generator to create signed tokens with HS256, RS256 or ES256.
QWhat is Bcrypt and when should I use it?
Bcrypt is a password-hashing function designed to be slow, making brute-force attacks expensive. Use it whenever you need to store user passwords — never store plain-text or MD5/SHA passwords.
QWhat SSH key types does the generator support?
The SSH key generator supports Ed25519 (recommended for modern security) and RSA 2048/4096-bit keys. Ed25519 keys are smaller, faster and more secure than RSA. The public key is output in authorized_keys format ready to paste into your server.
QWhat does the X.509 certificate decoder show?
It decodes PEM certificates entirely in your browser and displays the subject, issuer, serial number, validity dates (with expiry warning), Subject Alternative Names (SANs), public key type and whether the certificate is a CA.