Hashing, encoding, token analysis, and threat detection
7 tools available
Analyze PE/ELF/Mach-O executables - headers, sections, strings, entropy analysis
Generate various types of cryptographic hashes for security analysis
View and analyze file binary data with hex dump display like OllyDbg
Decode, analyze, and validate JSON Web Tokens (JWT) for security analysis
Generate and scan QR codes for data encoding and decoding
Generate typosquatting and homograph domain variants for brand protection and phishing detection
Scan URLs with URLVoid and VirusTotal to check for security threats
Important: All tools are for authorized security testing and educational use only.