Tool Cluster
Security & Privacy tools on SHRTX are grouped for tighter intent coverage, faster discovery, and stronger internal workflow linking.
Security & Privacy is organized as a focused operational cluster, not a broad utility bucket. This improves topical cohesion while preserving flat tool URLs.
Each tool remains canonical at /tools/{slug}. The cluster hub exists to improve crawl paths, contextual discovery, and intent alignment.
Use this hub to move through adjacent tasks without losing context between generators, validators, calculators, and transformers.
This page is intentionally lightweight during migration and can be expanded with pillar content after cutover stabilization.
Analyze password complexity and estimate crack-time using local heuristic rules.
Generate memorable but secure Diceware-style passphrases using cryptographically secure words.
Measure the mathematical strength of any string in bits to evaluate brute-force resistance.
Generate high-entropy random tokens, API keys, and secret strings for development.
Create cryptographically strong, randomized passwords with custom character rules.
Generate secure RSA and Ed25519 SSH key pairs locally for server access.
Simulate Time-based One-Time Passwords (TOTP) from shared secrets.
Securely check if your password appears in known data breaches via HIBP k-anonymity.
Inspect PGP keys with fingerprint checks, packet timeline, posture scoring, and exportable local audit reports.
Generate standard MD5, SHA-256, and SHA-512 cryptographic digests locally.
Verify if a plain text string matches an expected hash signature.
Verify local file integrity by calculating and comparing MD5 or SHA hashes.
Generate Keyed-Hash Message Authentication Codes (HMAC) using a secret key.
Generate cryptographic hashes for local files and export verification manifests.
Securely generate and verify Bcrypt hashes for development testing.
Generate secure RSA Public and Private key pairs locally.
Calculate an overall privacy health score for your project based on data handling practices.
A professional checklist to audit your privacy policy for GDPR, CCPA, and DPDP compliance.
Deconstruct and audit cookie strings for security attributes like HttpOnly and Secure flags.
Scan URLs for analytics identifiers, UTM tags, and cross-site tracking parameters.
Search text or logs for accidentally exposed API keys, emails, and sensitive PII.
Securely encrypt or decrypt any file locally using military-grade AES-GCM 256-bit encryption.
Securely encrypt or decrypt text snippets using AES-GCM encryption in your browser.
Anonymize documents by redacting sensitive text patterns with visual blocks.
Hide secret messages inside images using LSB encoding without altering visual appearance.
Store encrypted snippets in local storage with zero-knowledge master password protection.
Distribute a secret among parts that require a threshold to reconstruct.
Audit your unique hardware and software identity for privacy leaks.
Find network metadata and geographic data for any public IP address.
Securely wipe system clipboard contents to prevent data harvesting.
Build secure Content Security Policy (CSP) headers to prevent XSS attacks.
Generate Subresource Integrity (SRI) hashes for secure CDN script loading.
Generate self-signed SSL certificates and RSA private keys for testing.
Decode and inspect JSON Web Tokens (JWT) headers and payloads instantly without a secret.
Deep-audit JWT cryptographic headers for algorithm vulnerabilities and key metadata.
Validate SPF, DKIM, and DMARC DNS records to audit email authentication and deliverability.
Run a browser-based deliverability audit for SPF, DKIM, DMARC, and MX baseline checks.
Detect disposable or burner email domains using local provider intelligence and MX heuristics.
Check whether MX-resolved IPv4 addresses appear on major DNS-based blacklist zones.
Analyze MTA-STS and TLS-RPT DNS records to validate domain-level email transport security posture.
Inspect BIMI DNS records and preview configured brand logo assets for mailbox display readiness.
Parse raw email headers locally to inspect relay hops and authentication results.