Skip to main content
Category

Security Tools

Security utilities that respect your data: passwords are generated using the Web Crypto API (the same standard browsers use for TLS), hash functions run entirely in the browser, and JWT decoders never transmit your token. The strength meter uses zxcvbn-style entropy estimation rather than naive rule-checking, which means it correctly flags "P@ssw0rd!" as weak despite ticking every category checkbox.

All Security tools

Browse other categories