Browse our complete collection of free cybersecurity utilities
Analyze password entropy and complexity with detailed security metrics.
Apply RFC 3986 percent-encoding to URL components.
Convert between hexadecimal and text representations.
Encode and decode HTML character entities to prevent XSS.
Identify hash algorithm type based on format and length patterns.
Verify file integrity using cryptographic checksums.
Query geolocation data and ISP information for IP addresses.
Query DNS records including A, AAAA, MX, TXT, and CNAME records.
Query domain registration data and ownership records.
Reference database of common ports and associated services.
Encrypt and decrypt text using standard encryption algorithms.
Encrypt and decrypt data using AES-256 cipher in CBC or GCM mode.
Decode and inspect JSON Web Token headers, payloads, and signatures.
Validate SSL/TLS certificates and check expiration status.
Parse and analyze HTTP response headers for security configurations.
Parse user agent strings to identify browser, OS, and device information.
Generate cryptographically random strings with configurable parameters.
Generate placeholder text in various formats and lengths.