Free Online Tools for Public Use

Free online Desyrel 100 📂 Best online Pharma: 💎 www.LloydsPharmacy.online 💎 Buy Desyrel from $0.37 📂 Mg Yan Etkileri Nelerdir Buy Desyrel Online tools, SHA512 (SHA2) Hash Generator, SHA256 (SHA2) Hash Generator, HMAC (MD5, SHA1, SHA256, SHA512) Hash Generator, MD5 Hash Generator, RIPEMD-160 Hash Generator, SHA1 Hash Generator, SHA3 Hash Generator, PBKDF2 Hash Generator, Coin Flip, Indian Language Transliterator, Free utility tools collection and very useful for basic needs. These tools are developed and maintained for public use for free. You are free to collaborate to add more tools to this platform.. Are you missing any needy tool? Please request below.

Request for New Tool Publish your tool with our SDK
Search results for 'Desyrel 100 📂 Best online Pharma: 💎 www.LloydsPharmacy.online 💎 Buy Desyrel from $0.37 📂 Mg Yan Etkileri Nelerdir Buy Desyrel Online' 32
SHA512 (SHA2) Hash Generator
by free-tools.io Executed 52 times

Simple tool sha512 (sha2) strings for the text content online. SHA-512 is largely identical to SHA-256 but operates on 64-bit words rather than 32.

sha512 crypto cryptography security sha2 hash hashing generator hash-generator
SHA256 (SHA2) Hash Generator
by free-tools.io Executed 52 times

Simple tool sha256 (sha2) strings for the text content online. SHA-256 is one of the four variants in the SHA-2 set. It isn't as widely used as SHA-1, though it appears to provide much better security.

sha256 sha2 hash hashing generator hash-generator
HMAC (MD5, SHA1, SHA256, SHA512) Hash Generator
by free-tools.io Executed 118 times

Simple tool hmac (MD5, SHA1, SHA256, SHA512)strings for the text content online. Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

hmac crypto cryptography security md5 sha1 sha256 sha512 hash hashing generator hash-generator
MD5 Hash Generator
by free-tools.io Executed 81 times

Simple tool md5 strings for the text content online. MD5 is a widely used hash function. It's been used in a variety of security applications and is also commonly used to check the integrity of files. Though, MD5 is not collision resistant, and it isn't suitable for applications like SSL certificates or digital signatures that rely on this property.

md5 crypto cryptography security hash crypto cryptography security hashing generator hash-generator
RIPEMD-160 Hash Generator
by free-tools.io Executed 33 times

Simple tool ripemd-160 strings for the text content online. RIPEMD (RIPE Message Digest) is a family of cryptographic hash functions developed in 1992 (the original RIPEMD) and 1996 (other variants). There are five functions in the family: RIPEMD, RIPEMD-128, RIPEMD-160, RIPEMD-256, and RIPEMD-320, of which RIPEMD-160 is the most common.

ripemd-160 hash hashing generator hash-generator
SHA1 Hash Generator
by free-tools.io Executed 70 times

Simple tool sha1 strings for the text content online. The SHA hash functions were designed by the National Security Agency (NSA). SHA-1 is the most established of the existing SHA hash functions, and it's used in a variety of security applications and protocols. Though, SHA-1's collision resistance has been weakening as new attacks are discovered or improved.

sha1 crypto cryptography security hash hashing generator hash-generator
SHA3 Hash Generator
by free-tools.io Executed 181 times

Simple tool sha3 (512, 384, 256, 224) strings for the text content online. SHA-3 is the winner of a five-year competition to select a new cryptographic hash algorithm where 64 competing designs were evaluated. Each of the SHA-3 functions is based on an instance of the Keccak algorithm, which NIST selected as the winner of the SHA-3 competition, but those SHA-3 functions won't produce hashes identical to Keccak.

sha3 Keccak crypto cryptography security crypto cryptography security hash hashing generator hash-generator
PBKDF2 Hash Generator
by free-tools.io Executed 77 times

Simple tool PBKDF2 strings for the text content online. PBKDF2 is a password-based key derivation function. In many applications of cryptography, user security is ultimately dependent on a password, and because a password usually can't be used directly as a cryptographic key, some processing is required. A salt provides a large set of keys for any given password, and an iteration count increases the cost of producing keys from a password, thereby also increasing the difficulty of attack.

PBKDF2 crypto cryptography security hash crypto cryptography security hashing generator hash-generator
Coin Flip
by free-tools.io Executed 44 times

Simple tool simulate coin flip and show the result

luck coin flip random
Indian Language Transliterator
by sanskrit.today Executed 3,482 times

Simple online tool based on sanscript NPM package to transliterate between indian languages. (ahom, assamese, avestan, balinese, bengali, bhaisuki, brahmi, brahmi_tamil, burmese, chakma, cham, cyrillic, devanagari, dogra, gondi_gunjala, gondi_masaram, grantha, grantha_pandya, gujarati, gurmukhi, hk, iast, itrans, itrans_dravidian, javanese, kannada, khamti_shan, kharoshti, khmer, khom_thai, khudawadi, kolkata, lao, lao_pali, lepcha, limbu, mahajani, malayalam, manipuri, marchen, modi, mon, mro, multani, newa, ol_chiki, oriya, persian_old, phags_pa, ranjana, rejang, rohingya, sanskritOCR, shan, sharada, siddham, sinhala, slp1, sora_sompeng, sundanese, syloti_nagari, tagalog, tagbanwa, tai_laing, takri, tamil, tamil_extended, tamil_superscripted, telugu, thai, tibetan, tirhuta_maithili, urdu, vattelutu, velthuis, wancho, warang_citi, wx, zanbazar_square)

language transliterator transliterate translation india sanskrit ahom assamese avestan balinese bengali bhaisuki brahmi brahmi_tamil burmese chakma cham cyrillic devanagari dogra gondi_gunjala gondi_masaram grantha grantha_pandya gujarati gurmukhi hk iast itrans itrans_dravidian javanese kannada khamti_shan kharoshti khmer khom_thai khudawadi kolkata lao lao_pali lepcha limbu mahajani malayalam manipuri marchen modi mon mro multani newa ol_chiki oriya persian_old phags_pa ranjana rejang rohingya sanskritOCR shan sharada siddham sinhala slp1 sora_sompeng sundanese syloti_nagari tagalog tagbanwa tai_laing takri tamil tamil_extended tamil_superscripted telugu thai tibetan tirhuta_maithili urdu vattelutu velthuis wancho warang_citi wx zanbazar_square
AES Encrypt / Decrypt
by free-tools.io Executed 669 times

Simple tool to encrypt and decrypt using AES. The Advanced Encryption Standard (AES) is a U.S. Federal Information Processing Standard (FIPS). It was selected after a 5-year process where 15 competing designs were evaluated. This tool supports AES-128, AES-192, and AES-256. It will pick the variant by the size of the key you pass in. If you use a passphrase, then it will generate a 256-bit key.

aes cipher aes-128 aes-192 aes-256 crypto cryptography security hash encrypt encryption decrypt decryption crypto cryptography security hashing generator hash-generator
DES Encrypt / Decrypt
by free-tools.io Executed 172 times

Simple tool to encrypt and decrypt using DES. DES is a previously dominant algorithm for encryption, and was published as an official Federal Information Processing Standard (FIPS). DES is now considered to be insecure due to the small key size.

des cipher crypto cryptography security hash encrypt encryption decrypt decryption crypto cryptography security hashing generator hash-generator