Privacy & Security
Generator Kata Sandi
Buat kata sandi yang kuat dan acak
Pemeriksa Kekuatan Kata Sandi
Periksa kekuatan kata sandi dan perkiraan waktu crack
Generator Hash
Buat hash kriptografis dari teks atau file
Generator HMAC
Buat kode otentikasi HMAC dengan kunci rahasia
Enkripsi / Dekripsi AES
Enkripsi dan dekripsi teks dengan AES-256-GCM
Generator String Acak
Buat string acak yang aman secara kriptografis
Generator Header CSP
Buat header CSP untuk keamanan web
Peredaksi Teks
Redaksi informasi sensitif dari teks
Generator Header CORS
Buat header CORS untuk API lintas origin
Generator Hash SRI
Buat hash SRI untuk integritas sumber daya
Base64 Encoder / Decoder
Encode and decode Base64 with URL-safe variants
JWT Decoder
Decode and inspect JSON Web Tokens
UUID Generator
Generate and validate UUIDs (v4 random)
TOTP Configurator
SSL Certificate Decoder
Learn Privacy & Security
Key concepts and practical guides to level up your workflow.
📖 Glosarium
A technique that associates a host with its expected certificate, preventing man-in-the-middle attacks with forged …
Nilai yang dihitung dari blok data menggunakan algoritma tertentu yang berfungsi sebagai sidik jari untuk …
An attack that tricks users into clicking hidden elements by overlaying invisible frames on top …
An attack tricking an authenticated user into submitting unintended requests to a web application.
A standardized catalog of publicly known security vulnerabilities, each assigned a unique CVE-YYYY-NNNNN identifier.
An attack that overwhelms a server or network with traffic from many distributed sources, making …
A measure of randomness or unpredictability in a password, expressed in bits, indicating resistance to …
The winner of the Password Hashing Competition, designed to be memory-hard and resistant to GPU …
📘 Panduan
Password generation requires cryptographic randomness and careful character selection. This guide covers the principles behind strong password generation, entropy calculation, and common generation mistakes to …
Data breaches expose millions of passwords regularly. Learn how to check whether your credentials have been leaked without risking further exposure, using k-anonymity-based services and …
A password manager is the single most impactful security tool for most people. This comparison covers the key features to evaluate when choosing a password …
Photos contain hidden metadata including GPS coordinates, device info, and timestamps. Before sharing photos online, learn how to remove this data to protect your privacy …
Explore All Peasy Tools
15 specialized sites — one easy-peasy family.