Crypto & Security Tools
Privacy and security tools for hashing, redaction, token checks, and safe handling. This category contains 12 tools.
Hash Generator
Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from any text.
JWT Decoder
Decode and inspect JSON Web Tokens. View header, payload, and expiration.
ROT13 / Caesar Cipher
Encode/decode text with ROT13, ROT47, or custom Caesar cipher shift.
JWT Generator
Create JSON Web Tokens with custom payload, expiration, and HS256 signing.
Password Strength Checker
Analyze password strength with detailed scoring. Get tips to improve security.
HMAC Generator
Generate HMAC signatures using SHA-256, SHA-512, and other hash algorithms.
PII Redactor
Detect and redact emails, phones, cards, IBAN, IPs, and tokens from text.
Cookie Audit Parser
Parse Cookie/Set-Cookie headers and audit Secure, HttpOnly, and SameSite flags.
Browser Fingerprint Checker
Inspect browser/device fingerprint signals like canvas hash, WebGL, timezone, and platform.
Browser Permissions Auditor
Check browser permission states for camera, microphone, geolocation, notifications, and more.
WebRTC Leak Test
Check WebRTC ICE candidates for local/public IP exposure in your browser.
Secret Detector for Code Snippets
Detect hardcoded keys, tokens, and credential-like strings before sharing code snippets.
Explore More Categories
Crypto & Security FAQ
Does this category include privacy-focused tools?
Yes. It includes token scanners, redaction helpers, pseudonymization, and browser privacy diagnostics.
Can these tools reduce AI data leakage risk?
Yes. Tools like PII Redactor and Secret Detector help reduce accidental exposure before sharing text or code.