TOPICS / Cryptography
Cryptography
Hashing, encoding, encryption, and strong credentials.
Cryptography underpins confidentiality, integrity, and authentication — but only when used correctly. Weak algorithms, poor key management, and bad password hygiene quietly undermine otherwise solid systems.
These browser-side tools help you hash, encode, generate strong passphrases, and test password strength without anything leaving your device.
Free tools
Latest coverage
- CISA Contractor Leaked AWS GovCloud Keys on GitHub for Six Months
- Ghostwriter Deploys Prometheus Phishing Lures Against Ukraine Government Entities
- Screening Serpens: Iranian APT Fuses AppDomainManager Hijacking with New RATs in 2026 Espionage Campaign
- CVE-2026-9082: Critical Drupal SQL Injection Under Attack on Thousands of Sites
- CVE-2026-20182: Cisco Catalyst SD-WAN CVSS 10.0 Auth Bypass Actively Exploited
- Kali365 PhaaS Kit Bypasses Microsoft 365 MFA via Device Code Phishing — FBI Warning
- Megalodon: Supply Chain Attack Backdoors 5,561 GitHub Repos in Six Hours via CI/CD Workflow Injection
- Stolen Gemini API Keys and AI Fraud: How 'Quantum Patriot' Drained Crypto Wallets via Fake QAnon Content