Cryptography & security
26 tools available
Validate Bitcoin (BTC) wallet addresses and check if they are properly formatted according to Bitcoin network standards.
Encode or decode text using the classic Caesar cipher with adjustable shift values. Encrypt messages by rotating letters forward or decrypt by shifting backward.
Encrypt or decrypt text using the classic Vigenere polyalphabetic cipher with keyword-based substitution. Encode messages with repeating keyword patterns for stronger classical encryption.
Apply ROT13, ROT47, ROT5, or ROT18 rotation ciphers to encode and decode text. Simple letter rotation cipher for basic text obfuscation and classic encryption methods.
Generate Verhoeff checksum for numbers.
Generate random Bitcoin addresses for testing and development purposes. Perfect for mockups, demos, and development environments.
Detect homoglyphs (lookalike characters) in text that could be used for phishing or security attacks.
Generate MD5 hash from a file.
Generate top most popular file hashes.
Generate random tokens and secure strings
Generate random PIN codes with customizable length.
Generate and validate one-time passwords for two-factor authentication.
Calculate the time it would take to crack a password.
Calculate MD5 hash from text.
Generate random password based on a combination of letters, numbers, and symbols.
Generate secure numeric passwords or PINs. Create random digit sequences with options to exclude repeating digits for maximum security.
Generate memorable passphrases using random words. Create secure and easy-to-remember passwords with customizable separators, capitalization, and optional numbers or symbols.
Generate secure WiFi passwords for WEP, WPA, WPA2, and WPA3 networks. Create strong wireless network passwords with customizable length and character options.
Hide parts of text with asterisk or custom symbols. Mask sensitive information like credit cards, emails, or any text with flexible masking modes.
Check passwords against OWASP recommendations and common weakness patterns.
Generate RSA key pairs for cryptographic purposes with different key sizes and formats.
Extract signatures and files from ASICE (Associated Signature Containers) files.
Decode and inspect JWT tokens.
Transform JavaScript code to make it difficult to understand and reverse-engineer while preserving functionality
Calculate check digits using ISO 7064 MOD 97-10 algorithm. Commonly used for IBAN and LEI validation.
Generate and validate BIP39 mnemonic phrases for cryptocurrency wallets. Create secure recovery phrases with 12-24 words, convert between entropy and mnemonics, and derive cryptographic seeds with optional passphrases.