Encryption and cryptography tools

Encryption, cryptography, hash, public keys, private keys and data protection.

What are Encryption and cryptography tools used for?

  • Create BIP39 mnemonic seed phrases online for wallet testing, UX review, and training, with clear caution for real-asset security workflows.
  • Create an hmac signature from a message and secret so you can test signed api requests and webhook verification flows in a browser-based wor
  • Generate HAVAL hashes with selectable size, passes, input interpretation, and output format for legacy compatibility work.
  • This SHA hash generator is a family workbench rather than a single fixed algorithm page. The setup section lets you switch among multiple
  • Generate SHA-512 Hashes for Exact Digest Verification Built for technical users who need practical output and a cleaner next step.
  • Create bcrypt password hashes online for test users, auth debugging, migration checks, and browser-side password workflow validation.
  • Generate, compare, and troubleshoot GOST and GOST-CRYPTO digests with exact byte-handling controls for legacy matching.
  • Generate and compare FNV-1 and FNV-1a hashes with width selection, byte-mode controls, and output formatting for app compatibility tests.
  • This SHA3-512 hash generator is built for exact text-to-digest work when you need a browser-side result quickly, but still need enough
  • Hash passwords with Argon2i, Argon2d, or Argon2id and verify plain text against an existing hash in one page.
  • This SHA-224 hash generator is built for exact text-to-digest work when you need a browser-side result quickly, but still need enough
  • This SHA-256 hash generator is built for exact text-to-digest work when you need a browser-side result quickly, but still need enough
  • Generate Snefru Hashes for Legacy Compatibility and Digest Comparison Built for technical users who need practical output and a cleaner next
  • This SHA-1 hash generator is built for exact text-to-digest work when you need a browser-side result quickly, but still need enough control
  • A hash generator is most useful when you need a quick, repeatable digest for the exact text you entered. This page is built for that
  • Calculate and verify checksums for any file or string of characters.
  • Generate MD5 hashes from text or bytes with compare, formatting, and normalization controls for checksum and legacy testing.
  • Encrypt text in the browser with configurable AES key size, mode, IV, and secret key for development and test workflows.
  • This SHA3-384 hash generator is built for exact text-to-digest work when you need a browser-side result quickly, but still need enough
  • Generate XXH32, XXH64, XXH3, and XXH128 digests from text, hex bytes, or base64 input and compare outputs in the browser.
  • Generate CRC32 hashes online for integrity checks, test fixtures, compatibility testing, and fast comparison.
  • Generate WordPress-compatible password hashes for authorized recovery, migration, testing, and controlled account-management workflows.
  • Generate MD2 hashes from text or byte input with compare, formatting, and normalization controls for legacy workflows.
  • Decrypt AES-encrypted text or files with the correct key, IV, key size, and cipher mode right in the browser.
  • Generate Whirlpool hash values from text for digest comparison, integrity verification, and browser-side cryptographic workflow testing.
  • Use this Tiger hash generator when you need a deterministic Tiger digest for compatibility work, legacy tooling, or controlled verification.
  • This SHA3-256 hash generator is built for exact text-to-digest work when you need a browser-side result quickly, but still need enough
  • This SHA-384 hash generator is built for exact text-to-digest work when you need a browser-side result quickly, but still need enough
  • This SHA3-224 hash generator is built for exact text-to-digest work when you need a browser-side result quickly, but still need enough
  • Generate MurmurHash3 values in the browser for deterministic, non-cryptographic hashing workflows.
  • Reproduce Adler32 output from text or byte input, compare expected digests, and inspect checksum differences quickly.
  • Generate common cryptographic hashes online for debugging, comparisons, test fixtures, and integrity checks.
  • Create deterministic MD4 hashes from text or bytes for legacy systems, NTLM-adjacent handling, and compatibility testing.


CodersTool Categories