Hash, encrypt, generate strong secrets.
Tools tagged security help you hash, encrypt, generate strong passwords, and inspect tokens. Useful when prepping credentials, fingerprinting files, or auditing how an API is signing requests.
Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from text.
Generate strong passwords with configurable length and character types.
Generate HMAC signatures (SHA-1/256/384/512) from a message and secret key. Uses WebCrypto.
Encrypt or decrypt text with a passphrase using AES-GCM. Runs entirely in your browser.
Generate BIP39 seed phrases (12/15/18/21/24 words) offline in your browser. Useful for cryptocurrency wallets.