Security analysis, validation, and testing tools
Analyze HTTP security headers like CSP, HSTS, X-Frame-Options and get recommendations
Scan code and text for hardcoded secrets, API keys, tokens and credentials
Analyze JWT tokens for security issues, expiration, claims and algorithm vulnerabilities
Analyze SSL/TLS configurations, certificates, protocols and cipher suites for security
Validate SSL certificate chains, check expiration, verify intermediate certificates
Generate Cross-Origin Resource Sharing configurations for various web servers and frameworks
Check HTTP security headers against OWASP best practices and security guidelines
Validate and identify API keys from various services like AWS, GitHub, Stripe, OpenAI
Analyze OAuth tokens including access tokens, refresh tokens, and OpenID Connect ID tokens
Decode and analyze SAML assertions, responses, and metadata with attribute extraction
Convert certificates and keys between PEM and DER formats with type detection
Generate secure memorable passphrases using Diceware and EFF word lists
Encrypt and decrypt text using AES encryption with various key sizes
Calculate and verify file hashes using MD5, SHA-1, SHA-256, SHA-384, and SHA-512
Generate cryptographically secure random bytes in multiple formats
Generate cryptographic keys for various security applications
Parse and decode X.509 certificates
Decode Certificate Signing Requests
Generate RSA, EC, and Ed25519 private keys
Public Key Extractor tool
Key Pair Generator tool