Email Header Parser - Online Analyze Email Delivery Path
Paste raw email headers and get a human-readable breakdown of the delivery route, authentication results, and delays. Private analysis.
UD5 Toolkit
Paste a PGP armored message above and click Parse & Inspect
Supports: Encrypted messages, Signed messages, Public/Private key blocks, Cleartext signatures-----BEGIN PGP MESSAGE----- and -----END PGP MESSAGE----- headers. Each packet has a tag (identifying its type) and a length field, followed by the packet body. Common packet types include Public-Key Encrypted Session Key (tag 1), Symmetrically Encrypted Data (tag 9), Compressed Data (tag 8), and Literal Data (tag 11).
-----BEGIN PGP MESSAGE----- and -----END PGP MESSAGE-----. Armor headers can include metadata fields such as Version, Comment, and Hash (for signed messages). A CRC24 checksum (3 bytes, base64-encoded after a = sign) provides integrity verification. This tool decodes the armor, validates the CRC when possible, and displays the underlying packet structure.
RFC 4880 defines several packet types, each with a numeric tag:
gpg --list-packets on your local machine.
Paste raw email headers and get a human-readable breakdown of the delivery route, authentication results, and delays. Private analysis.
Paste a `Set‑Cookie` header and see all attributes parsed: domain, path, Max‑Age, SameSite, Secure, HttpOnly. Debug cookies easily.
Easily apply ROT13 cipher to obfuscate or reveal text. A classic letter substitution cipher that works bidirectionally. Purely client-side processing.
Paste a website's HTML and see which text is only visible to screen readers (e.g., .sr‑only). Preview the accessible layer.
Paste text and instantly see if it contains hidden zero‑width characters often used in steganography. Reveal invisible payloads.
Establish a peer‑to‑peer text chat between two browser tabs or devices using WebRTC data channels. All signaling via copy‑paste. No server.
Convert text and files to Base64 or decode Base64 back to original content. Processed locally with no server upload, ensuring complete data security.
Paste raw email headers and see authentication results (SPF, DKIM, DMARC) in a readable table. Find spoofing attempts.
Paste an enciphered text and instantly see all 25 possible shifts. Highlight the most plausible.
Paste text and detect its language (70+ languages) using a simple character n-gram model implemented in JavaScript. No server communication.
Create a temporary chat room between two browser tabs or devices on the same network using WebRTC data channels. Copy the code.
Drop or paste an .ics file and see all events in a readable table. Check dates, times, and locations. Privacy‑friendly.
Encode a hidden message using zero‑width characters. The message looks like normal text. Decode with the same tool.
Upload a text file to detect its character encoding (UTF-8, ISO-8859-1, etc.) and BOM presence. Runs entirely in your browser.
Browse, edit, and delete keys stored by the idb‑keyval library in your browser. Handy for debugging PWAs.
Enter a URL and extract tab‐index order violations and focusable elements. Quick accessibility audit. Client‑side fetch.
Click through the TCP connection states (LISTEN, SYN_SENT, ESTABLISHED…) and see the animated transitions. Networking education.
Paste HTML and see a collapsible tree of tags. Understand document outline and nesting. Handier than raw code.
Paste a string of 0s and 1s and decode it back into ASCII text. Handles space‑separated blocks. Local.
Drop a file to see its MIME type and the first few magic bytes (hex and ASCII). No upload, works instantly.
Parse a Snowflake ID (used by Discord, Twitter) into its timestamp, worker, and sequence components. Instant local decoding.
Animate text that looks like it's being decoded or scrambled before settling on the final word. Copy the JS snippet.
Encode or decode text using Base32 scheme. Ideal for legacy systems and data obfuscation. Works completely offline in your browser for maximum security.
See your current page load broken down into DNS, TLS, request, and DOM phases. Understand where time is spent.
See your current page load broken down into DNS, TLS, request, and DOM phases. Understand where time is spent.
Highlight elements with aria‑describedby and see the linked description text. Verify a11y annotations.
Shows each character's 7‑bit or 8‑bit binary representation. Includes space separation. For learning binary encoding.
Browse the fonts installed on your system and type a custom phrase to see how it looks. Uses Local Font Access API where available.
Generate a humorous, realistic‑looking git commit message. Perfect for testing or filling mock repos.
Translate text into semaphore flag positions and decode semaphore back to letters. Interactive animated flags. For scouts and maritime fans.