Privacy & Security
Password Generator
Generate strong, random passwords
Password Strength Checker
Analyze password strength and vulnerability
Hash Generator
Generate SHA and other cryptographic hashes
HMAC Generator
Generate keyed-hash message authentication codes
AES Encrypt / Decrypt
Encrypt and decrypt text with AES-256-GCM
Random String Generator
Generate cryptographically secure random strings
CSP Header Generator
Build Content Security Policy headers
Text Redactor
Redact sensitive information from text
CORS Header Generator
Build Cross-Origin Resource Sharing configurations
SRI Hash Generator
Generate Subresource Integrity hashes
Base64 Encoder / Decoder
Encode and decode Base64 with URL-safe variants
Decodificador JWT
Decodifique e inspecione tokens JWT.
Gerador de UUID
Gere UUIDs aleatรณrios versรฃo 4.
TOTP Configurator
SSL Certificate Decoder
Learn Privacy & Security
Key concepts and practical guides to level up your workflow.
๐ Glossรกrio
A technique that associates a host with its expected certificate, preventing man-in-the-middle attacks with forged โฆ
Um valor de tamanho fixo calculado a partir de um bloco de dados que serve โฆ
An attack that tricks users into clicking hidden elements by overlaying invisible frames on top โฆ
An attack tricking an authenticated user into submitting unintended requests to a web application.
A standardized catalog of publicly known security vulnerabilities, each assigned a unique CVE-YYYY-NNNNN identifier.
An attack that overwhelms a server or network with traffic from many distributed sources, making โฆ
A measure of randomness or unpredictability in a password, expressed in bits, indicating resistance to โฆ
The winner of the Password Hashing Competition, designed to be memory-hard and resistant to GPU โฆ
๐ Guias
Password generation requires cryptographic randomness and careful character selection. This guide covers the principles behind strong password generation, entropy calculation, and common generation mistakes to โฆ
Data breaches expose millions of passwords regularly. Learn how to check whether your credentials have been leaked without risking further exposure, using k-anonymity-based services and โฆ
A password manager is the single most impactful security tool for most people. This comparison covers the key features to evaluate when choosing a password โฆ
Photos contain hidden metadata including GPS coordinates, device info, and timestamps. Before sharing photos online, learn how to remove this data to protect your privacy โฆ
Explore All Peasy Tools
15 specialized sites โ one easy-peasy family.