Common Vulnerability Scoring System v3.1 — Calculate the base score for a vulnerability by selecting metrics below. Score updates live.
0.0
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
Exploitability Metrics
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Scope
Impact Metrics
Confidentiality
Integrity
Availability
Hash Generator
Generate MD5, SHA-1, SHA-256 and SHA-512 hashes. All computation runs locally in your browser — nothing is sent to any server.
Algorithm
Hash
MD5
—
SHA-1
—
SHA-256
—
SHA-512
—
MD5 and SHA-1 are cryptographically broken — do not use for security purposes. Use SHA-256 or SHA-512.
Encode / Decode
Base64, URL encoding, HTML entities, hex, binary and ROT13. Useful for analyzing payloads and obfuscated content.
Base64
URL
HTML
Hex
Binary
ROT13
Result
Password Strength Analyzer
Analyze password strength against NIST guidelines and common attack patterns. Also generates strong passwords. Nothing is stored or transmitted.
Strength
—
Generate Strong Password
Subnet Calculator
IPv4 subnet calculator. Enter a CIDR block or an IP address and mask to calculate network details, usable host range and broadcast address.
Network Address
—
Broadcast Address
—
First Usable Host
—
Last Usable Host
—
Subnet Mask
—
Wildcard Mask
—
Total Hosts
—
Usable Hosts
—
CIDR Notation
—
IP Class
—
Binary Mask
—
IP Info / WHOIS
Look up geolocation, ASN, organization and abuse contact for any IP address. Uses ipapi.co (free tier). Also checks if an IP is in common threat intel categories.
JWT Decoder
Decode and inspect JSON Web Tokens. The signature is not verified — this tool is for inspection only. Never paste production tokens into online tools; this runs locally in your browser.
Regex Tester
Test regular expressions against text. Useful for writing detection rules, log parsing patterns, input validation, and IOC extraction.
/
HTTP Header Analyzer
Paste HTTP response headers to analyze security configuration. Checks for missing security headers, insecure values and misconfigurations.
IOC Extractor
Paste a threat report, log snippet or raw text. Automatically extracts Indicators of Compromise: IP addresses, domains, URLs, hashes, email addresses and CVE IDs.
Epoch / Timestamp Converter
Convert between Unix epoch timestamps and human-readable dates. Useful for log analysis, forensic timelines and incident reconstruction.
Current Time
Converted
Epoch
Format Converter
CIDR Range Expander
Expand a CIDR block into all individual IP addresses, or list the range. Supports multiple CIDRs. Useful for firewall rule review, scope definition and network recon.
Result
Port / Service Lookup
Look up any port number to find the associated service, protocol and common security notes. Search by port number or service name.
Common Dangerous Ports (click to look up)
Certificate Transparency Search
Search Certificate Transparency logs for all SSL/TLS certificates issued for a domain — including subdomains. Useful for subdomain enumeration and attack surface mapping via crt.sh.
URL Analyzer
Dissect and analyze URLs. Extract scheme, host, port, path, query parameters and fragment. Detect suspicious patterns, encoded payloads and common attack indicators.
CVE Lookup
Look up CVE details from the NVD (National Vulnerability Database) via the NIST API. Get CVSS scores, affected products, description and references.
Notable CVEs (click to load)
DNS Recon
Query DNS records for any domain — A, AAAA, MX, NS, TXT, CNAME, SOA and SPF/DMARC. Uses the Google DNS-over-HTTPS API. No local DNS resolver needed.
Text Diff Checker
Compare two texts line by line. Useful for comparing config files, scripts, reports, log snippets or any two versions of a document.
JSON Formatter & Validator
Format, minify and validate JSON. Flatten nested structures, extract keys or values, and highlight errors. Useful for analyzing API responses, JWT payloads and config files.
Result
TLS / SSL Checker
Analyze the TLS configuration of any domain via the SSL Labs API. Check certificate validity, protocol versions (TLS 1.0/1.1/1.2/1.3), cipher suites and known vulnerabilities.
Uses the Qualys SSL Labs API. First scan may take 60–90 seconds if the host is not cached.
User-Agent Parser
Parse and decode User-Agent strings. Identify browser, OS, device type and bot/crawler indicators. Useful for log analysis, incident investigation and fingerprinting.
Common UAs (click to test)
We use analytics cookies to understand how visitors use this site. No advertising, no data sales. Cookie Policy