Image Watermarker - Online Add Text or Logo to Photos
Protect your images by adding a text or image watermark. Adjust transparency, position, and rotation. All image processing is done locally; no upload to server.
UD5 Toolkit
Protect your images by adding a text or image watermark. Adjust transparency, position, and rotation. All image processing is done locally; no upload to server.
Generate ultra-secure, random passwords with configurable length and character sets. Created entirely on your device; never transmitted or stored.
Paste raw email headers and get a human-readable breakdown of the delivery route, authentication results, and delays. Private analysis.
Paste email headers or body text to quickly spot phishing signs, suspicious domains, and obfuscated links. Educational and private.
Inspect any website's SSL/TLS certificate details: issuer, expiry date, subject, and SANs. Verify certificate chains. All checks are private and require no server upload.
Encrypt and decrypt messages using the classic Caesar cipher with configurable shift key. Fun for puzzles and basic cryptography lessons. Entirely browser-based.
Store passwords and notes encrypted with a master passphrase. Data lives only in your browser's localStorage. No cloud.
Strip dangerous HTML tags and attributes (scripts, onclick) to prevent XSS attacks. Safe iframe preview. Local sanitation engine.
Extract and view EXIF data from photos including camera settings, GPS location, and timestamps. All metadata read locally, your photos stay private.
Compare your password against a built‑in list of the 10,000 most common passwords. Instant warning if it appears.
Find out the real destination of any shortened link (bit.ly, t.co, etc.) without clicking. Resolves redirects locally using public HTTP headers.
Evaluate the strength of your passwords with a visual meter and detailed feedback. Check for length, complexity, and breached passwords. All analysis is client-side.
Decode the header and payload of a JSON Web Token (JWT) without verifying the signature. Inspect claims securely on the client side. Great for developers.
Easily apply ROT13 cipher to obfuscate or reveal text. A classic letter substitution cipher that works bidirectionally. Purely client-side processing.
Create a repeating text pattern from a short string for watermarking documents or images. Download SVG pattern.
Look at HTTP headers and JavaScript objects to guess which browser extensions might be installed. For awareness.
Build an iframe with different sandbox flags and see live which features are blocked. For secure embedding.
Instantly convert plain text into HTML‑safe escaped characters for secure display in web pages. Prevent cross‑site scripting. All processing local.
Generate a standard otpauth:// URI and QR code for authenticator apps. Set issuer, account, and secret. All local.
Generate encrypted passwords for .htaccess basic authentication. Create .htpasswd entries using bcrypt, MD5, or SHA. Server admin utility, local compute.
Obfuscate strings using simple techniques to prevent casual reading. Useful for hiding spoilers or email addresses from bots. Decode with the same tool.
Generate cryptographic and checksum hashes for any text string. Supports MD5, SHA-1, SHA-256, and CRC32. All hashing runs locally for maximum privacy.
Create random strings of any length using custom character sets. Perfect for generating API tokens, salts, and unique codes. Fully client-side secure.
Generate cryptographic key pairs using the Web Crypto API. Export as JWK or raw. No server needed; pure security.
Create a random long password that alternates consonants and vowels to mimic a pronounceable word. XKCD meets CVCV. Local.
Create secure passwords that look like gibberish words but are easy to pronounce and remember. Mix of syllables. Local generation.
Hide your email address from scrapers by encoding it using HTML entities and CSS tricks. Still clickable for real users. Local generator.
Create a strong, memorable password using 4 random common words. The famous xkcd method. Local wordlist.
Create a custom cookie consent banner with text, button styles, and colors. Copy the ready‑to‑use HTML/CSS/JS snippet.
Evaluate password strength through a short interactive story where each character set adds lines to a narrative. Educational fun.
Type a password and see a bar that fills based on estimated bits of entropy. Color‑coded feedback. No storage.
Generate a hash showing how trackers can fingerprint your browser (canvas, WebGL, fonts). Educational and privacy‑aware.
Generate Time‑based One‑Time Passwords locally by entering a base32 secret. Verify your authenticator setup without a phone.
Define minimum length, uppercase, digits, special chars, and check if a password meets your custom policy. Instant feedback.
Tell if your password has appeared in data breaches without sending the full password. Uses hash prefix locally.
Create a strong yet easy‑to‑remember passphrase from random common words. Combines 4‑6 words. Fully offline. XKCD compliant.
Escape HTML special characters to prevent XSS attacks, or unescape HTML entities back to original text. Essential for web developers. Runs locally.
Generate a CSR and private key pair in the browser using the Web Crypto API. Download both as files. No data sent to server.
Generate a DKIM DNS record from a public key and selector. Check syntax. Improve your domain’s email deliverability.
Build a valid SPF TXT record by selecting mail servers, IPv4/IPv6 ranges, and includes. Validate syntax and get ready‑to‑publish output.
Add a repeating diagonal text watermark to your images. Adjust opacity, font, and color. Protect your photos locally.
Apply a classic Caesar shift cipher with any key. Encrypt or decrypt text instantly. Brute force option included.
Convert plain text into HTML‑safe strings by escaping <, >, &, and quotes. Insert into code safely. Local copy.
Hide a secret message inside a normal text using zero-width characters or invisible ink. Copy the result. Decode with the same tool.
Paste a JSON Web Token and decode its header and payload. Verify signature if you provide the secret. Fully local.
Check if a password appears in the Have I Been Pwned database using k‑Anonymity. Only the first 5 characters of the hash are sent.
Paste raw email headers and see authentication results (SPF, DKIM, DMARC) in a readable table. Find spoofing attempts.
Check if a URL can be embedded in an iframe. Test your site’s defense against clickjacking. Browser‑based.
Fetch a site’s HSTS header and validate its syntax, max‑age, and subdomain flags. Ensure your site enforce HTTPS.
Paste a Content‑Security‑Policy header and get a human‑readable breakdown. See potential risks and suggestions.
Configure browser feature permissions (camera, microphone, geolocation) and generate the Permissions‑Policy HTTP header.
Hash passwords using the bcrypt algorithm with configurable cost factor. Also verify a password against a stored hash. All local.
Encrypt and decrypt text using the browser's Web Crypto API. Supports AES‑GCM and subtle key generation. No server required.
Create a PGP key pair (RSA or ECC) directly in your browser with passphrase protection. Export public/private armored keys. No upload.
Generate SHA‑1, SHA‑256, SHA‑512, and SHA‑3 digests of any text or file. Verify integrity. All in your browser.
Encrypt and decrypt text using AES in the browser with a password. Uses Web Crypto API. No data sent to server.
Create an HMAC (Hash‑based Message Authentication Code) using SHA‑256 or SHA‑512 with a secret key. Verify data integrity. Local.
Generate cryptographically secure BIP39 mnemonic phrases (12 or 24 words) for HD wallet seeds. All entropy generated locally.
Create a DMARC policy record with percentage, reporting addresses, and alignment mode. Validate and copy the final DNS TXT.
Enter a CDN URL for a script or style and generate the integrity attribute with sha384 or sha512. Protect your site.