Security & Hashing Tools - Free Online Tools

Hash, encode, decode, and validate data for security purposes. Generate cryptographic hashes, create secure passwords, decode JWT tokens, verify SSL certificates, and calculate subnet information. These tools help with security implementations, authentication debugging, and data integrity checks.

All cryptographic operations run locally in your browser using Web Crypto API. Nothing gets transmitted or logged.

Available Tools

##

Hash Generator

Generate MD5, SHA-1, and SHA-256 hashes from any text input. View all hash types simultaneously and copy individual results with one click.

#256

SHA256 Generator

Generate SHA-256 hashes with optional HMAC support. Configure input and output encodings for maximum flexibility.

#MD5

MD5 Generator

Generate MD5 hashes for checksums and legacy systems. Includes HMAC support and multiple encodings.

#SHA3

SHA3 Generator

Generate SHA3-224, SHA3-256, SHA3-384, and SHA3-512 hashes with HMAC and flexible encoding options.

BCRYPT

Bcrypt Generator/Checker

Generate bcrypt password hashes and verify passwords against hashes. Includes salt rounds configuration and generation time display.

PWD

Password Generator

Generate strong, secure passwords with customizable options. Includes password strength meter and bulk generation mode.

JWT

JWT Decoder

Decode JSON Web Tokens to inspect their header and payload. Automatically detects and highlights expired tokens. No signature verification for privacy.

JWT+

JWT Creator

Generate JSON Web Tokens with custom claims and signatures. Includes decoded preview and expiration helpers.

BCRYPT

SSL Certificate Decoder

Decode PEM-encoded SSL certificates. View issuer, subject, expiry date, domains, and key algorithm information.

HTTP

CIDR Calculator

Calculate network information from CIDR notation. Get network address, broadcast, usable hosts, subnet mask, and IP range.

B64

Base64 Encoder/Decoder

Encode text or files to Base64, or decode Base64 strings back to their original form. Supports both text input and file uploads for maximum flexibility.

Why Use Security Tools?

Security implementations require precision. A wrong hash algorithm breaks authentication. An incorrectly encoded JWT can't be validated. Debugging security issues is frustrating when you can't see what's actually in your tokens or headers.

These tools help you understand and debug security implementations. Decode a JWT to see what claims it contains. Generate a hash to verify your hashing implementation is working correctly. Create bcrypt hashes for password storage. Verify SSL certificate details before deployment.

They're also useful for learning. Want to understand how JWTs work? Decode a few and see the structure. Curious about different hash algorithms? Generate hashes and compare outputs. These tools make security concepts more concrete.

Common Use Cases

  • • Decoding JWT tokens to debug authentication issues
  • • Generating SHA-256 hashes for file integrity verification
  • • Creating bcrypt hashes for secure password storage
  • • Encoding API credentials in Base64 for Authorization headers
  • • Verifying SSL certificate details and expiration dates
  • • Generating secure random passwords for service accounts
  • • Creating JWTs for testing authentication flows
  • • Calculating subnet ranges for network configuration
  • • Comparing hash outputs from different algorithms
  • • Debugging API signature verification with HMAC

Related Categories: Generators | Encoders & Decoders | Developer Utilities