Security Tools
A collection of free online tools to help secure your applications and data
Generate modified JWT tokens for security testing and vulnerability assessment.
Verify JWT signatures, check expiration, and inspect token contents.
Create cryptographically secure keys with customizable length from 32 to 512 bits.
Generate secure passwords with options for length, special characters, and more.
Generate API keys with prefixes, suffixes, and customizable formats.
Create MD5, SHA-1, SHA-256, and other hash formats from any input text.
Create version 1, 4, or 5 UUIDs for database keys, identifiers, and more.
Create AES, RSA, and other encryption keys for secure data storage and transmission.
Professional JWT token generator with customizable header, payload, and signature key.
Encrypt and decrypt data using DES and 3DES algorithms, suitable for enterprise internal data storage encryption.
Generate key pairs, encrypt and decrypt data using RSA algorithm, commonly used in secure communications and digital signatures.
Convert binary data (like images and files) into text form for transmission and restore it upon reception.
Encode and decode special characters in URLs to ensure the correct transmission and recognition of URLs.