Security Tools
Security analysis, password generation, encryption, and threat intelligence tools
Our browser-based security tools handle password testing, CVE lookups, JWT decoding, encryption, and threat intelligence—all without sending your data to external servers. Every tool processes data locally in your browser, ensuring sensitive information never leaves your device.
From generating secure passwords to analyzing email headers for phishing indicators, these tools support the daily work of security professionals. Whether you're investigating a suspicious domain, decoding a malicious payload, or generating cryptographic keys, you'll find utilities that work offline and respect your privacy.
Who Uses These Tools
Security analysts investigating phishing campaigns and suspicious domains
Developers implementing authentication, encryption, and secure configurations
IT administrators auditing security headers and email authentication
Penetration testers performing reconnaissance and payload analysis
Cipher & Encryption Tools
Classical ciphers, modern encryption, and cryptanalysis utilities
Certificate & SSL Tools
X.509 certificates, SSL/TLS analysis, and PKI utilities
Key Generation Tools
Generate SSH keys, PGP keys, and other cryptographic key pairs
Email Security Tools
SPF, DKIM, DMARC configuration and email header analysis
Vulnerability & Threat Intel
CVE lookup, MITRE ATT&CK, threat intelligence, and vulnerability analysis
Malware Analysis Tools
Binary analysis, string extraction, disassembly, and malware forensics
Hash & Encoding Tools
Hash generation, Base64 encoding, and data format utilities
Web Security Tools
Security headers, CSP policies, CORS analysis, and web security testing
Security Operations
SIEM queries, incident response, compliance mapping, and security operations
Password & Authentication
Password strength testing, generation, and authentication tools
Explore Other Categories
Need Expert Help?
Our tools can help you assess your needs, but sometimes you need expert guidance. Let's talk about your cybersecurity challenges.