Category
Security Tools
Security utilities that respect your data: passwords are generated using the Web Crypto API (the same standard browsers use for TLS), hash functions run entirely in the browser, and JWT decoders never transmit your token. The strength meter uses zxcvbn-style entropy estimation rather than naive rule-checking, which means it correctly flags "P@ssw0rd!" as weak despite ticking every category checkbox.