Weak Password Dictionary Check - Online Top 10k List
Compare your password against a built‑in list of the 10,000 most common passwords. Instant warning if it appears.
UD5 Toolkit
Watch your password come to life as a visual narrative. See how your digital fortress stands against attackers in real-time.
Enter a password to get personalized improvement suggestions.
All analysis happens locally in your browser. Your password is never transmitted, stored, or logged anywhere.
Compare your password against a built‑in list of the 10,000 most common passwords. Instant warning if it appears.
Create secure passwords that look like gibberish words but are easy to pronounce and remember. Mix of syllables. Local generation.
Create a random long password that alternates consonants and vowels to mimic a pronounceable word. XKCD meets CVCV. Local.
Generate a bcrypt hash from a password with configurable salt rounds. Verify a password against a hash. Entirely client‑side.
Press any key and see it light up on a standard QWERTY layout. Check functionality or demonstrate shortcuts.
Set a 20, 30, or 45‑minute countdown to simulate a technical interview. Hidden/unhidden. Boost your prep.
Simple interactive eye dominance test: hold up a virtual dot and see which eye stays aligned. Educational.
Toggle a screen wake lock to prevent the device from dimming or sleeping. See the lock state and learn the API.
Request and release a screen wake lock to keep the device awake. See the lock state in real time. Perfect for recipes or presentations.
Touch your screen and see the pressure and radius reported. Visualize force. Mobile developer tool.
Select your bin type and get a custom instruction on securing it with bungees, straps, or locks.
Write upside down text using Unicode flipped characters. Copy and paste to surprise friends. Completely frontend and instant.
Play pure tones at various frequencies to estimate your hearing range. Simple and educational.
A sound-enabled spinning wheel with your custom options. Exciting animation and result reveal. Local only.
Enter a word and get a list of perfect and near rhymes. Categorized by syllable count. Useful for songwriting and poems. Static data, local.
Measure your visual and auditory reaction speed. Average and best times shown. No data collected. Pure Javascript timing.
Tap any key to measure beats per minute. Displays average BPM and beat interval in milliseconds. Essential for DJs and music production. No extra permissions.
Tap any key to the beat of a song and the tool calculates the BPM. Also shows average and millisecond delay for loops.
Compare common knots by their efficiency percentage and residual strength. Interactive chart with animated diagrams.
Click to get a random element and a short story about its discovery and uses. Fascinating science.
Calculate the entropy (in bits) of a password based on character pool size and length. Visual strength meter with crack time estimation. Local only.
Combine random character, setting, conflict, and genre to generate unique story prompts. Over 10,000 possible combinations. Perfect for overcoming writer's block.
Calculate your one-rep max using Epley, Brzycki, Lombardi or O'Conner formulas. Predict maximum lifting capacity and plan progressive overload. 100% local processing.
Enter a router's MAC address or serial and generate the common default WPA passphrase for major ISP brands. Educational purpose only.
Enter a password and see the estimated time it would take to crack using brute force at different speeds. Educational.
Check if a password appears in the Have I Been Pwned database using k‑Anonymity. Only the first 5 characters of the hash are sent.
Estimate your one‑rep max from weight and reps. Supports Epley, Brzycki, Lombardi formulas. See your strength level.
Simulate a traceroute by entering a destination IP. Learn about AS paths and latency. Does not send real packets; educational visualisation.
Derive a strong cryptographic key from a password using PBKDF2 with SHA‑256. Adjust iterations and salt. Educational and test tool.
Generate Argon2id hashes in the browser using a WASM compilation. Choose memory, iterations, and parallelism. Secure local hashing.