Security and Identity Tools
Security and identity pages collect the tools used for auth debugging, signature verification, token inspection, and integrity checks.
Tools In This Category
Everything here supports the security & identity workflow.
9 results
JD JWT Decoder Inspect JWT header and payload claims locally without verifying the signature.UG UUID Generator Generate UUIDs for distributed systems, test data, and temporary identifiers.S2 SHA-256 Hash Generator Generate SHA-256 hashes in the browser for integrity checks and quick comparisons.HG Hash Generator Compute MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes entirely in the browser.PG Password Generator Generate cryptographically secure passwords with configurable character sets and length.HG HMAC Generator Compute HMAC signatures with SHA-1, SHA-256, SHA-384, or SHA-512 for API debugging.UG ULID Generator Generate and parse ULIDs — time-sortable unique identifiers using Crockford Base32.PK PEM Key Parser Paste a PEM-encoded key or certificate and inspect algorithm, key size, and OIDs.TG TOTP Generator Generate time-based one-time passwords for debugging 2FA setups.