3 free security & hashing tools — JWT decoder (HS/RS/ES), JWT generator (HS256/RS256), MD5/SHA-1/SHA-256/SHA-512 hash generator. Browser-only Web Crypto, no upload, no signup.
3 Security & Hashing Tools
The security tools cluster covers the two operations every backend / API developer reaches for daily: token inspection (JWT decode/generate) and integrity verification (cryptographic hashes). Both are operations where uploading your data to a third-party server would be a confidentiality violation — production JWTs contain PII, and hash inputs are often unreleased file builds. Every tool in this cluster runs the cryptographic operation in the browser via the Web Crypto API, the same NIST-validated implementation that powers HTTPS in Chrome, Firefox, and Safari. Source code never leaves the page.
Three operations frequently confused, with security consequences when mixed up. Encoding (Base64, URL-encoding) is reversible and uses no key — anyone can decode. JWTs are encoded, not encrypted. Hashing (MD5, SHA-256, BLAKE3) is one-way — same input always produces same output, but you can't reverse the hash. Used for integrity (file checksums), fingerprinting, deduplication, and password storage (with salt + slow KDF). Signing (HMAC-SHA, RSA-PKCS, ECDSA) combines hashing with a key — produces a tag that proves "the holder of the secret key signed this message". JWTs are signed, not encrypted by default. Mixing these up is the #1 root cause of broken auth flows.
Both JWT Decoder and JWT Generator on this site run entirely client-side. Decoder uses native atob + JSON.parse on the Base64URL parts. Generator uses crypto.subtle.sign('HMAC', key, data) for HS-family algorithms or crypto.subtle.sign('RSASSA-PKCS1-v1_5', privateKey, data) for RS-family. The token, the secret, and the private key all stay in the browser tab. Verify by opening DevTools → Network tab and observing zero outgoing requests on decode / sign. Critical security warning: never paste a production signing secret into any online tool. Use HS256 generators only for local development tokens, dummy claims for unit tests, or short-lived debugging tokens with throwaway secrets.
| Need | Tool |
|---|---|
| Inspect a JWT (claims, expiration, header) | JWT Decoder |
| Generate & sign a JWT for testing | JWT Generator |
| Compute MD5/SHA-1/SHA-256/SHA-512 hash of text or file | Hash Generator |
| Verify a published file checksum | Hash Generator (compare mode) |
| Generate a strong random password | Password Generator |
Generate a UUID for jti claim | UUID Generator |
For the deeper auth pattern story — OAuth2.1, OpenID Connect, refresh tokens, key rotation — read the API Authentication Guide.
Security tools here cover the everyday auth-and-integrity tasks: inspecting JWTs from your auth provider, generating hashes for file integrity or password storage research, and minting tokens for local testing. None of these are substitutes for a real auth library or KMS — they're for debugging, learning, and one-off checks. Everything runs locally; tokens and inputs never leave your browser.
bcrypt, argon2id, or scrypt on the server. Hash generators here are for integrity, not password storage.exp on JWTs. Tokens without expiration live forever — a leaked token is a permanent compromise. Always set exp; rotate refresh tokens regularly.Frequently Asked Questions
Other Categories