Encoding & Cryptography Tools
Free online tools for Base64 encoding, URL encoding, hash generation (MD5, SHA-256, BLAKE3), number base conversion, and JWT token handling. Works offline.
Encode
Encode & decode Base64, URL & Hex
Hash
Generate MD5, SHA & BLAKE hashes
Base
Convert binary, octal & hex
JWT
Sign & verify tokens
About Encoding & Cryptography Tools
Encoding transforms data between representations: Base64 for binary-to-text, URL-encoding for safe query strings, hex for low-level debugging. Cryptographic hashing creates fixed-size fingerprints used for integrity checks, password storage, and digital signatures. JWT (JSON Web Tokens) combine both worlds: Base64url-encoded payloads with HMAC or RSA signatures. These tools let you encode, decode, hash, and verify without installing anything. All computation stays in your browser.
Frequently Asked Questions
What encoding formats are supported?
The Encoder supports Base64, URL encoding (percent-encoding), HTML entities, and hexadecimal. The Base Converter handles binary (base 2), octal (base 8), decimal (base 10), and hexadecimal (base 16).
Which hash algorithms can I use?
The Hash Generator supports MD5, SHA-1, SHA-256, SHA-384, SHA-512, BLAKE2b, and BLAKE3. You can hash text input or drag-and-drop files directly.
Is encoding the same as encryption?
No. Encoding (like Base64) is a reversible transformation with no secret key, so anyone can decode it. Encryption uses a key to make data unreadable without that key. Hashing is a one-way function: you cannot reverse a SHA-256 hash to get the original input.
Can I verify JWT tokens here?
Yes. The JWT tool decodes header and payload, and can verify HMAC signatures (HS256, HS384, HS512) if you provide the secret. For RSA/ECDSA verification, you would need the public key.
Are these tools secure for production secrets?
All processing happens client-side, so nothing is transmitted over the network. However, avoid pasting production secrets on shared or public computers. For sensitive operations, prefer local CLI tools or hardware security modules.