Privacy & Security
Password Generator
Generate strong, random passwords
Password Strength Checker
Analyze password strength and vulnerability
Hash Generator
Generate SHA and other cryptographic hashes
HMAC Generator
Generate keyed-hash message authentication codes
AES Encrypt / Decrypt
Encrypt and decrypt text with AES-256-GCM
Random String Generator
Generate cryptographically secure random strings
CSP Header Generator
Build Content Security Policy headers
Text Redactor
Redact sensitive information from text
CORS Header Generator
Build Cross-Origin Resource Sharing configurations
SRI Hash Generator
Generate Subresource Integrity hashes
Base64 एन्कोडर / डिकोडर
टेक्स्ट और फ़ाइलों को Base64 में एन्कोड और डिकोड करें
JWT Decoder
Decode and inspect JSON Web Tokens
UUID Generator
Generate and validate UUIDs (v4 random)
TOTP कॉन्फ़िगरेटर
SSL प्रमाणपत्र डिकोडर
Learn Privacy & Security
Key concepts and practical guides to level up your workflow.
📖 शब्दावली
A technique that associates a host with its expected certificate, preventing man-in-the-middle attacks with forged …
एक विशिष्ट एल्गोरिदम का उपयोग करके डेटा ब्लॉक से गणना किया गया मान जो डेटा …
An attack that tricks users into clicking hidden elements by overlaying invisible frames on top …
An attack tricking an authenticated user into submitting unintended requests to a web application.
A standardized catalog of publicly known security vulnerabilities, each assigned a unique CVE-YYYY-NNNNN identifier.
An attack that overwhelms a server or network with traffic from many distributed sources, making …
A measure of randomness or unpredictability in a password, expressed in bits, indicating resistance to …
The winner of the Password Hashing Competition, designed to be memory-hard and resistant to GPU …
📘 गाइड
Password generation requires cryptographic randomness and careful character selection. This guide covers the principles behind strong password generation, entropy calculation, and common generation mistakes to …
Data breaches expose millions of passwords regularly. Learn how to check whether your credentials have been leaked without risking further exposure, using k-anonymity-based services and …
A password manager is the single most impactful security tool for most people. This comparison covers the key features to evaluate when choosing a password …
Photos contain hidden metadata including GPS coordinates, device info, and timestamps. Before sharing photos online, learn how to remove this data to protect your privacy …
Explore All Peasy Tools
15 specialized sites — one easy-peasy family.