Privacy & Security
Password Generator
Generate strong, random passwords
Password Strength Checker
Analyze password strength and vulnerability
Hash Generator
Generate SHA and other cryptographic hashes
HMAC Generator
Generate keyed-hash message authentication codes
AES Encrypt / Decrypt
Encrypt and decrypt text with AES-256-GCM
Random String Generator
Generate cryptographically secure random strings
CSP Header Generator
Build Content Security Policy headers
Text Redactor
Redact sensitive information from text
CORS Header Generator
Build Cross-Origin Resource Sharing configurations
SRI Hash Generator
Generate Subresource Integrity hashes
Base64 Encoder / Decoder
Encode and decode Base64 with URL-safe variants
JWT Decoder
Decode and inspect JSON Web Tokens
UUID Generator
Generate and validate UUIDs (v4 random)
TOTP Configurator
SSL Certificate Decoder
Learn Privacy & Security
Key concepts and practical guides to level up your workflow.
π Glossaire
A technique that associates a host with its expected certificate, preventing man-in-the-middle attacks with forged β¦
Une valeur de taille fixe calculΓ©e Γ partir d'un bloc de donnΓ©es qui sert d'empreinte β¦
An attack that tricks users into clicking hidden elements by overlaying invisible frames on top β¦
An attack tricking an authenticated user into submitting unintended requests to a web application.
A standardized catalog of publicly known security vulnerabilities, each assigned a unique CVE-YYYY-NNNNN identifier.
An attack that overwhelms a server or network with traffic from many distributed sources, making β¦
A measure of randomness or unpredictability in a password, expressed in bits, indicating resistance to β¦
The winner of the Password Hashing Competition, designed to be memory-hard and resistant to GPU β¦
π Guides
Password generation requires cryptographic randomness and careful character selection. This guide covers the principles behind strong password generation, entropy calculation, and common generation mistakes to β¦
Data breaches expose millions of passwords regularly. Learn how to check whether your credentials have been leaked without risking further exposure, using k-anonymity-based services and β¦
A password manager is the single most impactful security tool for most people. This comparison covers the key features to evaluate when choosing a password β¦
Photos contain hidden metadata including GPS coordinates, device info, and timestamps. Before sharing photos online, learn how to remove this data to protect your privacy β¦
Explore All Peasy Tools
15 specialized sites β one easy-peasy family.