
Password Generator
Generate secure, random passwords with customizable length, numbers, and special characters , no data sent to any server.

Hash, encrypt, compare, and decode sensitive values entirely in your browser , no server, no exposure.
Security-sensitive tasks , hashing passwords, verifying checksums, inspecting tokens, generating UUIDs , require tools you can trust not to exfiltrate your data. Cloud-based hash generators and JWT decoders are convenient, but submitting a production password or a live API token to an unknown server is a risk that is difficult to justify. Our free security tools online run every operation client-side in your browser: no network requests, no server logs, no third-party telemetry. The collection covers bcrypt password hashing with configurable work factors, SHA-256 and SHA-512 cryptographic checksums, a strong password generator with entropy estimation, JWT decoding with header and payload inspection, RFC 4122-compliant UUID v4 generation, and URL-safe Base64 encoding. These tools are suitable for developers, security engineers, and privacy-conscious users who need professional cryptographic utilities without installing local software.

Generate secure, random passwords with customizable length, numbers, and special characters , no data sent to any server.

Create QR codes for URLs, text, WiFi credentials, and email with one-click download , instantly in your browser.

Encode and decode text to and from Base64 format instantly in your browser , essential developer utility.

Decode and inspect JSON Web Tokens to view header, payload, and signature structure , essential for API debugging.

Generate and compare bcrypt hashes in one browser-based workspace - secure password hashing with no server upload.

Create and compare common hash outputs for text input instantly - useful for checksums and integrity checks.

Create HS256 JWT tokens from a payload, headers, and secret , test auth flows without a backend.

Encrypt and decrypt text with AES-GCM using the Web Crypto API , secure client-side encryption tool.

Generate RSA-OAEP public and private key pairs in PEM format , essential for asymmetric encryption workflows.

Score passwords for length, character variety, and repetition risk , fully private, nothing sent anywhere.
Generate bcrypt hashes for passwords before storing them in a database. Test different work factors (cost parameters) to balance security and authentication latency. Verify that a plaintext password matches a stored bcrypt hash without running server-side code.
Compute SHA-256 or SHA-512 checksums of files or strings to verify integrity. Compare the output against a published checksum to confirm a downloaded binary has not been tampered with. Use the diff checker alongside hash tools to audit configuration file changes.
Decode JWT tokens to inspect claims, expiry timestamps, and signing algorithm without a running backend. Identify misconfigured tokens (wrong audience, expired iat, or missing sub claim) during local development or code review.
Generate cryptographically random UUID v4 values for database primary keys, idempotency tokens, and session identifiers. Use the password generator to create high-entropy API keys, webhook secrets, and service account credentials.
Yes , for the purpose of testing and development. The bcrypt computation runs entirely in your browser using a pure-JavaScript implementation. Nothing is transmitted to a server. In production, password hashing should always happen server-side; this tool is for generating test hashes, tuning work factors, and verifying stored hashes.
The OWASP password storage cheat sheet recommends a work factor (cost) that makes hashing take at least 1 second on your target hardware. For most modern servers, a work factor of 12–13 achieves this. The bcrypt tool lets you experiment with different values and see the output instantly.
The JWT decoder can decode the header and payload of any JWT , signed (JWS) or unsigned , because the Base64url-encoded sections are not encrypted. If the token is a JWE (JSON Web Encryption), the payload is encrypted and cannot be decoded without the private key.
Yes. UUID v4 generation uses the browser's crypto.getRandomValues() API, which is a cryptographically secure pseudo-random number generator (CSPRNG). This is the same entropy source used by production UUID libraries in Node.js and browser runtimes.
NIST SP 800-63B recommends a minimum of 8 characters but notes that longer passwords (15+) dramatically increase resistance to brute-force attacks. The password generator defaults to 16 characters with mixed case, digits, and symbols, giving roughly 96 bits of entropy , sufficient for most high-value accounts.
No. SHA-256 is a general-purpose hash function designed for speed, which makes it unsuitable for password storage , attackers can compute billions of SHA-256 hashes per second on commodity hardware. Use bcrypt, Argon2, or scrypt for password hashing. SHA-256 is appropriate for file integrity verification and data fingerprinting.
249+ browser-based tools across 16 categories , all free, no sign-up required.