Free Online Security Tools
Password generator, hash generator, encryption, JWT decoder and more security utilities.
Base64 Encoder
Encode and decode text and files to Base64
Try now βPassword Generator
Generate strong, secure passwords with customizable options
Try now βHash Generator
Generate SHA-1, SHA-256, SHA-384 and SHA-512 hashes
Try now βUUID Generator
Generate random UUID v4 identifiers
Try now βJWT Decoder
Decode and inspect JSON Web Tokens (JWT)
Try now βPassword Strength Checker
Analyze password strength with entropy calculation, pattern detection, and security tips.
Try now βHMAC Generator
Generate HMAC authentication codes using SHA-1, SHA-256, SHA-384, or SHA-512.
Try now βAES Encrypt/Decrypt
Encrypt and decrypt text using AES-256-GCM with password-based key derivation.
Try now βCRC32 Checker
Calculate CRC32 checksums for text or files to verify data integrity.
Try now βCredit Card Validator
Validate credit card numbers using the Luhn algorithm and detect card type.
Try now βTOTP Generator
Generate Time-based One-Time Passwords (TOTP) for two-factor authentication.
Try now βRSA Key Generator
Generate RSA key pairs (1024, 2048, 4096 bit) in PEM format using Web Crypto API.
Try now βPBKDF2 Key Derivation
Derive cryptographic keys from passwords using PBKDF2 with configurable parameters.
Try now βEXIF Viewer
View EXIF metadata from images - camera, date, GPS, and more
Try now βFile Hash Checker
Calculate SHA-1, SHA-256, SHA-384, SHA-512 hashes for any file
Try now βText Steganography
Hide secret messages inside normal text using invisible characters
Try now βSSL Certificate Decoder
Decode and inspect PEM-encoded SSL/TLS certificates
Try now βKey Pair Generator
Generate RSA or ECDSA cryptographic key pairs in PEM format
Try now βWhy Use Tuttilo Security Tools?
- All cryptographic operations run locally β nothing leaves your browser.
- Uses the Web Crypto API for secure, standards-compliant operations.
- No data logging or tracking of your passwords or hashes.
Frequently Asked Questions
Are the generated passwords truly random?+
Yes. We use the Web Crypto API (crypto.getRandomValues) which provides cryptographically secure random numbers.
Is my data safe when using encryption tools?+
Absolutely. All encryption and hashing happens in your browser. No data is ever sent to our servers.
What hash algorithms are supported?+
We support MD5, SHA-1, SHA-256, SHA-512, Bcrypt, HMAC and CRC32 among others.