Privacy & Security
Password Generator
Generate strong, random passwords
Password Strength Checker
Analyze password strength and vulnerability
Hash Generator
Generate SHA and other cryptographic hashes
HMAC Generator
Generate keyed-hash message authentication codes
AES Encrypt / Decrypt
Encrypt and decrypt text with AES-256-GCM
Random String Generator
Generate cryptographically secure random strings
CSP Header Generator
Build Content Security Policy headers
Text Redactor
Redact sensitive information from text
CORS Header Generator
Build Cross-Origin Resource Sharing configurations
SRI Hash Generator
Generate Subresource Integrity hashes
Base64 Encoder / Decoder
Encode and decode Base64 with URL-safe variants
JWT Decoder
Decode and inspect JSON Web Tokens
UUID Generator
Generate and validate UUIDs (v4 random)
TOTP Configurator
SSL Certificate Decoder
Learn Privacy & Security
Key concepts and practical guides to level up your workflow.
📖 Glossar
A technique that associates a host with its expected certificate, preventing man-in-the-middle attacks with forged …
Ein Wert, der aus einem Datenblock mithilfe eines bestimmten Algorithmus berechnet wird und als Fingerabdruck …
An attack that tricks users into clicking hidden elements by overlaying invisible frames on top …
An attack tricking an authenticated user into submitting unintended requests to a web application.
A standardized catalog of publicly known security vulnerabilities, each assigned a unique CVE-YYYY-NNNNN identifier.
An attack that overwhelms a server or network with traffic from many distributed sources, making …
A measure of randomness or unpredictability in a password, expressed in bits, indicating resistance to …
The winner of the Password Hashing Competition, designed to be memory-hard and resistant to GPU …
📘 Anleitungen
Password generation requires cryptographic randomness and careful character selection. This guide covers the principles behind strong password generation, entropy calculation, and common generation mistakes to …
Data breaches expose millions of passwords regularly. Learn how to check whether your credentials have been leaked without risking further exposure, using k-anonymity-based services and …
A password manager is the single most impactful security tool for most people. This comparison covers the key features to evaluate when choosing a password …
Photos contain hidden metadata including GPS coordinates, device info, and timestamps. Before sharing photos online, learn how to remove this data to protect your privacy …
Explore All Peasy Tools
15 specialized sites — one easy-peasy family.