Security Engineering Hub
Cryptography primitives, secrets management, and certificate tooling — everything you need to harden your infrastructure without context-switching to Stack Overflow.
Hash Generator
Generate MD5, SHA-1, SHA-256, and SHA-512 hashes instantly.
HMAC Generator
Compute Keyed-Hash Message Authentication Codes (SHA-256, SHA-512).
Password Strength Analyzer
Analyze password entropy and get improvement suggestions using zxcvbn.
Bcrypt Generator
Generate and verify Bcrypt hashes using a pure JS implementation.
JWT Decoder
Inspect JWT headers and payloads without verification.
JWT Encoder
Build JWT headers and payloads, then export unsigned or signed tokens.
UUID/ULID Generator
Batch-generate UUIDs or ULIDs and validate formats.
SSH Key Generator
Generate secure RSA, Ed25519, and ECDSA SSH key pairs.
SSH Config Generator
Generate SSH config files for multiple GitHub, GitLab, and other host identities.
SSL Certificate Checker
Check SSL certificate details, expiration dates, issuer information, and certificate transparency logs.
SSH Key Validator
Validate OpenSSH private keys, check passphrases, and view key details.
Incident Playbooks
When TLS breaks or auth fails in production — step-by-step runbooks to diagnose fast.
TLS or auth issue in production?
The Troubleshooting Wizard handles cert failures, OIDC errors, Kubernetes 401/403, and service account token issues.
TLS/SSL Cheat Sheet
Cipher suites, key sizes, protocol versions, and the commands to inspect them all.
- TLS 1.2 vs 1.3 differences
- openssl s_client one-liners
- Certificate chain validation
Compliance for DevOps
What SOC 2, HIPAA, and PCI-DSS actually require from your infrastructure team.
- Audit log requirements
- Encryption at rest and in transit
- Access control evidence for auditors
Security Deep-Dives
View all security guides
Secrets Management: Vault vs ESO
Choosing the right secrets management architecture for Kubernetes workloads.

Kubernetes RBAC in Practice
Least privilege without the headache. Roles, Bindings, and Audit tools.

Runtime Security with Tetragon
Using eBPF to observe and block malicious syscalls in kernel space.