Privacy & Security
Password Generator
Generate strong, random passwords
Password Strength Checker
Analyze password strength and vulnerability
Hash Generator
Generate SHA and other cryptographic hashes
HMAC Generator
Generate keyed-hash message authentication codes
AES Encrypt / Decrypt
Encrypt and decrypt text with AES-256-GCM
Random String Generator
Generate cryptographically secure random strings
CSP Header Generator
Build Content Security Policy headers
Text Redactor
Redact sensitive information from text
CORS Header Generator
Build Cross-Origin Resource Sharing configurations
SRI Hash Generator
Generate Subresource Integrity hashes
Base64 Encoder / Decoder
Encode and decode Base64 with URL-safe variants
JWT Decoder
Decode and inspect JSON Web Tokens
UUID Generator
Generate and validate UUIDs (v4 random)
TOTP Configurator
SSL Certificate Decoder
Learn Privacy & Security
Key concepts and practical guides to level up your workflow.
📖 Glossary
A security process requiring two distinct forms of identification — typically a password and a …
A symmetric block cipher used worldwide for encrypting sensitive data, with key sizes of 128, …
The winner of the Password Hashing Competition, designed to be memory-hard and resistant to GPU …
A technique that associates a host with its expected certificate, preventing man-in-the-middle attacks with forged …
A value computed from file data used to verify that the file hasn't been altered …
An attack that tricks users into clicking hidden elements by overlaying invisible frames on top …
An attack passing arbitrary operating system commands through a vulnerable application to the host system.
Overly permissive CORS headers allowing unauthorized origins to read sensitive API responses in the browser.
📘 Guides
Data breaches expose millions of passwords regularly. Learn how to check whether your credentials have been leaked without risking further exposure, using k-anonymity-based services and …
Password generation requires cryptographic randomness and careful character selection. This guide covers the principles behind strong password generation, entropy calculation, and common generation mistakes to …
Learn the science behind password strength meters and entropy calculations. Understand what makes a password truly secure, how attackers crack weak passwords, and practical strategies …
Compare the security, convenience, and cost of major 2FA methods including authenticator apps, SMS codes, hardware security keys, and biometrics. Find the right balance between …
Explore All Peasy Tools
15 specialized sites — one easy-peasy family.