security Tools,
Easy Peasy
Security tools made easy. No sign-up, no upload — processed entirely in your browser.
Password Generator
Generate strong, random passwords
Password Strength Checker
Analyze password strength and vulnerability
Hash Generator
Generate SHA and other cryptographic hashes
HMAC Generator
Generate keyed-hash message authentication codes
AES Encrypt / Decrypt
Encrypt and decrypt text with AES-256-GCM
Random String Generator
Generate cryptographically secure random strings
CSP Header Generator
Build Content Security Policy headers
Text Redactor
Redact sensitive information from text
CORS Header Generator
Build Cross-Origin Resource Sharing configurations
SRI Hash Generator
Generate Subresource Integrity hashes
Base64 Encoder / Decoder
Encode and decode Base64 with URL-safe variants
JWT Decoder
Decode and inspect JSON Web Tokens
UUID Generator
Generate and validate UUIDs (v4 random)
TOTP Configurator
SSL Certificate Decoder
Learn security
Key concepts and practical guides to level up your workflow.
📖 Glossary
A security process requiring two distinct forms of identification — typically a password and a …
A symmetric block cipher used worldwide for encrypting sensitive data, with key sizes of 128, …
The winner of the Password Hashing Competition, designed to be memory-hard and resistant to GPU …
A technique that associates a host with its expected certificate, preventing man-in-the-middle attacks with forged …
A value computed from file data used to verify that the file hasn't been altered …
An attack that tricks users into clicking hidden elements by overlaying invisible frames on top …
An attack passing arbitrary operating system commands through a vulnerable application to the host system.
Overly permissive CORS headers allowing unauthorized origins to read sensitive API responses in the browser.
📘 Guides
Data breaches expose millions of passwords regularly. Learn how to check whether your credentials have been leaked without risking further exposure, using k-anonymity-based services and …
Password generation requires cryptographic randomness and careful character selection. This guide covers the principles behind strong password generation, entropy calculation, and common generation mistakes to …
Learn the science behind password strength meters and entropy calculations. Understand what makes a password truly secure, how attackers crack weak passwords, and practical strategies …
Compare the security, convenience, and cost of major 2FA methods including authenticator apps, SMS codes, hardware security keys, and biometrics. Find the right balance between …
Explore All Peasy Tools
15 specialized sites — one easy-peasy family.