Free Online Tools for Public Use

Free Online crypto Tools, AES Encrypt / Decrypt, Bitcoin (BTC) Address Generator, Crypto Address/Wallet Balance Checker, Currency Converter, DES Encrypt / Decrypt, HMAC (MD5, SHA1, SHA256, SHA512) Hash Generator, MD5 Hash Generator, PBKDF2 Hash Generator, RC4 Encrypt / Decrypt, RC4Drop Encrypt / Decrypt, Free utility tools collection and very useful for basic needs. These tools are developed and maintained for public use for free. You are free to collaborate to add more tools to this platform.. Are you missing any needy tool? Please request below.

Request for New Tool Publish your tool with our SDK
Free online crypto tools 16
AES Encrypt / Decrypt
by free-tools.io Executed 10,954 times

Simple tool to encrypt and decrypt using AES. The Advanced Encryption Standard (AES) is a U.S. Federal Information Processing Standard (FIPS). It was selected after a 5-year process where 15 competing designs were evaluated. This tool supports AES-128, AES-192, and AES-256. It will pick the variant by the size of the key you pass in. If you use a passphrase, then it will generate a 256-bit key.

aes cipher aes-128 aes-192 aes-256 crypto cryptography security hash encrypt encryption decrypt decryption crypto cryptography security hashing generator hash-generator
Bitcoin (BTC) Address Generator
by free-tools.io Executed 199 times

Generate your own Bitcoin (BTC) wallet address to receive funds

security crypto currency bitcoin btc finance fund wallet address generator
Crypto Address/Wallet Balance Checker
by free-tools.io Executed 114 times

Check crypto wallet balance online for any crypto currency address. It supports almost all crypto addresses like Bitcoin, Litecoin, Dogecoin, Ethereum, Counterparty, Open Assets Protocol, Ripple and Ripple based IOUs, Omni, NXT and NXT AE, NEM, Bitshares with account names, Factom, Dash, PeerCoin, Blackcoin, Grantcoin, CapriCoin, Rubycoin, etc...

crypto encoding balance-checker crypto checker wallet balance Bitcoin Litecoin Dogecoin Ethereum Counterparty Open Assets Protocol Ripple Ripple based IOUs Omni NXT and NXT AE NEM Bitshares accoutn Factom Dash PeerCoin Blackcoin Grantcoin CapriCoin Rubycoin BTC LTC ETH DOGE DASH
DES Encrypt / Decrypt
by free-tools.io Executed 4,693 times

Simple tool to encrypt and decrypt using DES. DES is a previously dominant algorithm for encryption, and was published as an official Federal Information Processing Standard (FIPS). DES is now considered to be insecure due to the small key size.

des cipher crypto cryptography security hash encrypt encryption decrypt decryption crypto cryptography security hashing generator hash-generator
HMAC (MD5, SHA1, SHA256, SHA512) Hash Generator
by free-tools.io Executed 940 times

Simple tool hmac (MD5, SHA1, SHA256, SHA512)strings for the text content online. Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.

hmac crypto cryptography security md5 sha1 sha256 sha512 hash hashing generator hash-generator
MD5 Hash Generator
by free-tools.io Executed 1,225 times

Simple tool md5 strings for the text content online. MD5 is a widely used hash function. It's been used in a variety of security applications and is also commonly used to check the integrity of files. Though, MD5 is not collision resistant, and it isn't suitable for applications like SSL certificates or digital signatures that rely on this property.

md5 crypto cryptography security hash crypto cryptography security hashing generator hash-generator
PBKDF2 Hash Generator
by free-tools.io Executed 1,224 times

Simple tool PBKDF2 strings for the text content online. PBKDF2 is a password-based key derivation function. In many applications of cryptography, user security is ultimately dependent on a password, and because a password usually can't be used directly as a cryptographic key, some processing is required. A salt provides a large set of keys for any given password, and an iteration count increases the cost of producing keys from a password, thereby also increasing the difficulty of attack.

PBKDF2 crypto cryptography security hash crypto cryptography security hashing generator hash-generator
RC4 Encrypt / Decrypt
by free-tools.io Executed 226 times

Simple tool to encrypt and decrypt using RC4. RC4 is a widely-used stream cipher. It's used in popular protocols such as SSL and WEP. Although remarkable for its simplicity and speed, the algorithm's history doesn't inspire confidence in its security.

rc4 cipher crypto cryptography security hash encrypt encryption decrypt decryption crypto cryptography security hashing generator hash-generator
RC4Drop Encrypt / Decrypt
by free-tools.io Executed 437 times

Simple tool to encrypt and decrypt using RC4Drop. It was discovered that the first few bytes of keystream are strongly non-random and leak information about the key. We can defend against this attack by discarding the initial portion of the keystream. This modified algorithm is traditionally called RC4-drop. By default, 192 words (768 bytes) are dropped by this tool.

rc4drop rc4 cipher crypto cryptography security hash encrypt encryption decrypt decryption crypto cryptography security hashing generator hash-generator
Rabbit Encrypt / Decrypt
by free-tools.io Executed 998 times

Simple tool to encrypt and decrypt using Rabbit. Rabbit is a high-performance stream cipher and a finalist in the eSTREAM Portfolio. It is one of the four designs selected after a 3 1/2-year process where 22 designs were evaluated.

rabbit cipher crypto cryptography security hash encrypt encryption decrypt decryption crypto cryptography security hashing generator hash-generator
SHA1 Hash Generator
by free-tools.io Executed 389 times

Simple tool sha1 strings for the text content online. The SHA hash functions were designed by the National Security Agency (NSA). SHA-1 is the most established of the existing SHA hash functions, and it's used in a variety of security applications and protocols. Though, SHA-1's collision resistance has been weakening as new attacks are discovered or improved.

sha1 crypto cryptography security hash hashing generator hash-generator