All Tools
Browse by category or use the search box to find a specific tool instantly. Every tool runs in your browser — no accounts, no uploads, no data sent to a backend unless the tool explicitly requires a network lookup (such as WHOIS or DNS resolution).
The tools here cover the formats and protocols that appear most often in backend development, DevOps, and security work: JSON, JWTs, IP addressing, CIDR subnets, cryptographic hashing, regular expressions, Unix timestamps, YAML, and more. For the concepts behind the tools, see the Learn section. For workflow-based usage examples, see the Blog.
JSON Tools
YAML Tools
Text Tools
Debugging Tools
Time Tools
URL Tools
Security Tools
How to use this catalog
This page is more than a link dump. It is the map for the site. Start with the category that matches your workflow, then move into the deeper guides and related articles when you need context beyond the utility itself.
- Use JSON, URL, Base64, and JWT tools for payload inspection and API debugging
- Use network and WHOIS tools when tracing hosts, ranges, ownership, and addressing issues
- Use Diff Checker, Log Explorer, and Regex Tester when you are narrowing an incident or reviewing a suspicious change
- Use hash, UUID, and security tools when integrity, identifiers, or browser security headers are involved
Editorial support around the tools
AdSense approval and long-term search performance depend on the site behaving like a real technical property, not a thin collection of widgets. That means the tools connect to supporting content.
- Learn contains longer explainers for concepts like JSON, JWTs, hashing, CIDR, regex, and browser security headers
- Blog publishes workflow-based articles that show when to use a tool, what mistakes to avoid, and how tools fit together during real engineering work
- About, Privacy, Terms, and Contact provide the trust and policy signals a real publisher needs
Tool categories in detail
JSON Tools cover the full spectrum of working with JSON in development: formatting and prettifying API responses for readability, minifying for production payloads, editing and transforming JSON structures inline, decoding JWTs (which are JSON-based tokens), and generating TypeScript type definitions from existing JSON shapes. These are the tools you reach for during API development, response debugging, and data pipeline work.
Network Tools handle the IP addressing and domain investigation tasks that come up during infrastructure work and incident response. IP address converters translate between dotted-decimal, binary, hexadecimal, and integer representations — the four formats that appear in different contexts (logs, packet captures, kernel interfaces, databases). CIDR conversion shows host ranges and broadcast addresses for any subnet prefix. WHOIS and IP Lookup provide domain registration and ASN/geolocation data. Hostname to IP resolves DNS records using Google's public resolver without installing any local tooling.
Security Tools include the CSP Analyzer for inspecting and validating Content Security Policy headers, and Secure Paste for sharing sensitive snippets via AES-GCM encrypted URLs — where the encrypted payload lives in the URL fragment and never reaches the server. These complement the JWT Decoder in the JSON section for a complete browser-based security toolkit.
Debugging Tools — Log Explorer and Regex Tester — are the tools for investigation work. Log Explorer lets you filter, search, and highlight log output without copying it into a terminal. Regex Tester runs JavaScript RegExp patterns against sample text with live match highlighting, group extraction, and flag support. Both are designed for the kind of ad hoc analysis that happens during incidents or when reviewing unfamiliar log formats.
Hash Generators, UUID Generator, Base64, and Encoding Tools handle the utility operations that come up constantly in development: generating test identifiers, verifying file integrity, encoding and decoding data for transport, and computing checksums. The hash generator supports MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3, and RIPEMD-160 — all running in the browser via the Web Crypto API.
Security and privacy notes
Most tools on this site run entirely in the browser. That matters when you are handling logs, tokens, config fragments, headers, or private payloads. Client-side execution reduces accidental data sharing during debugging, but it does not remove the need to sanitize sensitive information before copying it into tickets, chat threads, or screenshots.
When a tool does require a network lookup by design, such as WHOIS or IP intelligence, the page should make that expectation clear. The goal is practical utility without hidden data handling.