Free Online Tools for Public Use

Free online free web hosting php'[0] tools, Currency Converter, JWT (JSON Web Token) Decoder, Writing - Markdown/LaTex Editor Viewer, PassCheck, CyberChef, Coin Flip, RIPEMD-160 Hash Generator, SHA1 Hash Generator, SHA3 Hash Generator, SHA256 (SHA2) Hash Generator, Free utility tools collection and very useful for basic needs. These tools are developed and maintained for public use for free. You are free to collaborate to add more tools to this platform.. Are you missing any needy tool? Please request below.

Request for New Tool Publish your tool with our SDK
Search results for 'free web hosting php'[0]' 70
JWT (JSON Web Token) Decoder
by Executed 0 times

Simple tool decode JWT Token

jwt decode json web token
Writing - Markdown/LaTex Editor Viewer

Lightweight distraction-free text editor, in the browser (Markdown and LaTeX supported). No lag when writing.

writing markdown latex editor viewer javascript

A web application featuring some handy password tools, including a password generator, strength checker and HaveIBeenPwned breach checker.

password generator check password-check breach-check

Perform all manner of 'cyber' operations within a web browser such as AES, DES and Blowfish encryption and decryption, creating hexdumps, calculating hashes, and much more.

cyber chef cyberchef security hash encryption AES DES Blowfish binary hexdump compression decompression data checksum IPv6 X509 parsing character-encoding
Coin Flip
by Executed 362 times

Simple tool simulate coin flip and show the result

luck coin flip random
RIPEMD-160 Hash Generator
by Executed 1,245 times

Simple tool ripemd-160 strings for the text content online. RIPEMD (RIPE Message Digest) is a family of cryptographic hash functions developed in 1992 (the original RIPEMD) and 1996 (other variants). There are five functions in the family: RIPEMD, RIPEMD-128, RIPEMD-160, RIPEMD-256, and RIPEMD-320, of which RIPEMD-160 is the most common.

ripemd-160 hash hashing generator hash-generator
SHA1 Hash Generator
by Executed 1,732 times

Simple tool sha1 strings for the text content online. The SHA hash functions were designed by the National Security Agency (NSA). SHA-1 is the most established of the existing SHA hash functions, and it's used in a variety of security applications and protocols. Though, SHA-1's collision resistance has been weakening as new attacks are discovered or improved.

sha1 crypto cryptography security hash hashing generator hash-generator
SHA3 Hash Generator
by Executed 938 times

Simple tool sha3 (512, 384, 256, 224) strings for the text content online. SHA-3 is the winner of a five-year competition to select a new cryptographic hash algorithm where 64 competing designs were evaluated. Each of the SHA-3 functions is based on an instance of the Keccak algorithm, which NIST selected as the winner of the SHA-3 competition, but those SHA-3 functions won't produce hashes identical to Keccak.

sha3 Keccak crypto cryptography security crypto cryptography security hash hashing generator hash-generator
SHA256 (SHA2) Hash Generator
by Executed 4,076 times

Simple tool sha256 (sha2) strings for the text content online. SHA-256 is one of the four variants in the SHA-2 set. It isn't as widely used as SHA-1, though it appears to provide much better security.

sha256 sha2 hash hashing generator hash-generator
RC4 Encrypt / Decrypt
by Executed 520 times

Simple tool to encrypt and decrypt using RC4. RC4 is a widely-used stream cipher. It's used in popular protocols such as SSL and WEP. Although remarkable for its simplicity and speed, the algorithm's history doesn't inspire confidence in its security.

rc4 cipher crypto cryptography security hash encrypt encryption decrypt decryption crypto cryptography security hashing generator hash-generator
HMAC (MD5, SHA1, SHA256, SHA512) Hash Generator
by Executed 3,094 times

Simple tool hmac (MD5, SHA1, SHA256, SHA512)strings for the text content online. Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

hmac crypto cryptography security md5 sha1 sha256 sha512 hash hashing generator hash-generator
Recent Search