Cryptography & security
13 tools available
Identify hash types from hash strings. Supports MD5, SHA-1, SHA-256, SHA-512, bcrypt, Argon2, and many more hash algorithms.
Generate printable Bitcoin vouchers with blank spaces for writing seed phrase words by hand
Generate MySQL password hashes for authentication. Supports MySQL Native Password (SHA1) and legacy Old Password formats.
Generate HMAC (Hash-based Message Authentication Code) using SHA-256, SHA-384, SHA-512, or SHA-1 algorithms with a secret key
Generate secure OpenPGP key pairs (ECC or RSA) with public key, private key, and revocation certificate for encryption and digital signatures
Generate self-signed SSL/TLS certificates for local development and testing. Create X.509 certificates with customizable validity, key size, and subject details.
Encrypt and decrypt text using AES-128, AES-192, or AES-256 encryption with a secret key.
Validate Bitcoin addresses and detect address type (Legacy, SegWit, Taproot) and network (Mainnet, Testnet)
Validate Ethereum addresses and check EIP-55 checksum encoding
Verify and extract digital signatures from PDF files. Check certificate authenticity, integrity, and validity.
Analyze and inspect X.509 SSL/TLS certificates. View certificate details including subject, issuer, validity period, extensions, key usage, and fingerprints.
Sign and unsign HTTP cookie values using HMAC-SHA256 for secure session management and data integrity verification
Redact and mask sensitive data in JSON objects like passwords, API keys, tokens, emails, and personal information. GDPR-compliant data sanitization.