WebAuthn Response Decoder - Online Unpack Attestation
Paste a raw WebAuthn attestation response (CBOR) and decode its fields: format, authenticator data, and extensions. Debug passkeys locally.
UD5 Toolkit
Instantly measure your password's cryptographic strength in bits of entropy
log₂(pool_sizelength) = length × log₂(pool_size). For example, a truly random 8-character password using all 94 printable ASCII characters has about 52 bits of entropy. Higher entropy means exponentially stronger resistance against brute-force attacks.
NIST guidelines recommend at least 80 bits for general use and 112+ bits for high-security applications.
pool_sizelength) by the attack speed and halving it (average case). Attack speeds vary greatly:
Note: These are optimistic estimates. Real-world entropy is often lower due to predictable human patterns not captured by pure entropy formulas.
Our tool detects many of these patterns and warns you accordingly.
Paste a raw WebAuthn attestation response (CBOR) and decode its fields: format, authenticator data, and extensions. Debug passkeys locally.
Enter two tire sizes and see a side‑by‑side comparison of diameter, width, and speedometer error. Local math.
Calculate your one-rep max using Epley, Brzycki, Lombardi or O'Conner formulas. Predict maximum lifting capacity and plan progressive overload. 100% local processing.
Estimate your one‑rep max (1RM) from weight and reps. Supports multiple formulas (Epley, Brzycki). Training percentages table.
Estimate your one‑rep max from weight and reps. Supports Epley, Brzycki, Lombardi formulas. See your strength level.
Type a few words and see them rendered at every heading size (h1–h6) with your chosen font. Perfect for design systems.
Upload a small image and generate the CSS code for a custom cursor. Test it live on the page. Tiny but useful.
Select any element on the test page and monitor its size changes with ResizeObserver. See log of all entries.
Explore the size‑container and inline‑size CSS properties for container queries. Understand containment contexts. Visual guide.
Enter a chemical formula (e.g., H2O, C6H12O6) and calculate its molar mass. Handles parentheses and hydrates. Pure frontend.
Add appliances with running and starting watts to estimate needed generator capacity. Prevent overload.
Make an element resizable horizontally, vertically, or both. See the handle and code. Useful for textareas.
Toggle print‑specific styles like removing backgrounds, showing link URLs, and adding page breaks. Generate a complete print stylesheet instantly.
Find your healthy weight range using multiple medical formulas (Hamwi, Devine, Robinson, Miller). Frame size adjustment included. Instant local computation.
Add print styles like removing backgrounds, adding page breaks, setting margins. See print preview instantly.
Drag to resize a box and see the Resize Observer callback fire. Get contentRect and borderBoxSize. Learn the API.
Start from a base color and use `oklch(from color l c h)` to create lighter or darker variants. Copy the code.
Highlight elements with aria‑describedby and see the linked description text. Verify a11y annotations.
Watch a simulation of how the JavaScript event loop handles synchronous code, microtasks, and macrotasks. Learn async.
Check if a password appears in the Have I Been Pwned database using k‑Anonymity. Only the first 5 characters of the hash are sent.
Call navigator.storage.estimate() and display a visual pie chart of used vs. available browser storage. For PWA debugging.
Hash passwords using the bcrypt algorithm with configurable cost factor. Also verify a password against a stored hash. All local.
Create a random long password that alternates consonants and vowels to mimic a pronounceable word. XKCD meets CVCV. Local.
Add, remove, push, pop items and watch the data structure change visually. Supports arrays, stacks, and queues. For CS students.
Paste a JSON object and see a dynamic, draggable tree graph representation. Excellent for debugging nested data.
Evaluate password strength through a short interactive story where each character set adds lines to a narrative. Educational fun.
Create secure passwords that look like gibberish words but are easy to pronounce and remember. Mix of syllables. Local generation.
Store passwords and notes encrypted with a master passphrase. Data lives only in your browser's localStorage. No cloud.
Create a strong, memorable password using 4 random common words. The famous xkcd method. Local wordlist.
Upload an audio clip and generate an animated GIF of its waveform dancing. Shareable sound snippet. Canvas magic.