Back to Collections

API & Security Tools for Developers

Debug APIs, generate or inspect JWTs, encrypt sensitive text, sign requests, verify checksums, and inspect network settings. Decode tokens, create HS256 JWTs, calculate Linux permissions, convert cURL commands, analyze IPv4 networks, validate IBANs, and generate test payment data.

10 min read
Updated 2026-03-29
Share this collection:

API development and security testing require specialized tools for debugging authentication, converting HTTP requests, validating financial data, and testing payment integrations. Developers need to decode JWT tokens without exposing secrets, convert API documentation examples to code, validate international bank accounts, test payment gateways with dummy data, and configure file permissions correctly.

These tools handle API debugging, security configuration, and testing scenarios without requiring production credentials or risking security breaches. Decode JWT tokens to inspect claims, generate test JWTs with HS256 or alg:none, encrypt sensitive notes with AES, generate HMAC signatures for webhooks and signed requests, calculate checksums for release verification, inspect IPv4 subnet and CIDR layouts, convert cURL commands to Fetch API code, calculate Unix file permissions visually, validate IBAN formats, and generate test credit card numbers that pass validation for sandbox testing.

Useful for API developers debugging authentication, DevOps engineers configuring servers, fintech developers testing payment flows, security professionals auditing systems, and anyone working with web APIs or server administration. All tools process data locally without external requests.

How to Use These Tools

Step-by-step guidance and best practices for getting the most out of this collection

JWT (JSON Web Token) tokens authenticate API requests by encoding user identity and claims in three parts: header, payload, and signature. The JWT Decoder parses these sections without validating the signature, letting you inspect claims like user ID, expiration time, and permissions. The JWT Generator complements it by creating test tokens locally from JSON header and payload objects, with support for HS256 signing or alg:none for unsigned previews. Together they help debug authentication issues, verify token contents during development, and understand API authorization without leaving the browser.

AES encryption protects sensitive text by turning plaintext into ciphertext with a secret password and random parameters. The AES Encrypt tool creates AES-GCM payloads locally, while the AES Decrypt tool reverses compatible payloads back into plaintext with the original password. A PBKDF2-derived key converts your password into an encryption key, while random salt and IV values ensure the same plaintext does not always produce the same ciphertext. This is useful for private notes, internal config snippets, or exchanging sensitive strings without exposing them in plain text.

HMAC (Hash-based Message Authentication Code) signs a message with a shared secret so receivers can confirm the payload came from someone holding the same key and that the content was not altered. The HMAC Generator helps test webhook signature validation, signed query parameters, and API authentication flows. Unlike plain hashes, HMAC output depends on both the message and the secret, making it suitable for authenticity checks instead of simple integrity-only workflows.

Checksums provide integrity verification for files and text. The Checksum Calculator hashes content with SHA algorithms and can compare the result with an expected value you paste in. This is useful when validating release artifacts, downloaded backups, deployment bundles, or copied config text. Matching checksums suggest the content has not changed; mismatches signal corruption, truncation, or the wrong source file.

IPv4 network planning depends on understanding subnet masks, CIDR prefixes, wildcard masks, and host ranges. The Subnet Calculator and CIDR Calculator turn those values into concrete network boundaries, showing the network address, broadcast address, first and last usable hosts, and total host capacity. This helps when carving VLANs, documenting firewall rules, designing cloud address space, or debugging incorrect routing assumptions. The IP Address Converter complements those tools by translating IPv4 addresses into decimal, hexadecimal, and binary representations often seen in logs, low-level tooling, or vendor documentation.

cURL to Fetch conversion transforms command-line API examples into JavaScript code for browser or Node.js applications. API documentation often provides cURL examples because they are concise and platform-independent. The cURL to Fetch Converter parses cURL syntax, extracting URL, headers, request body, and HTTP method, then generates equivalent JavaScript Fetch API code. This accelerates integrating third-party APIs by converting documentation examples directly to working code. The converter handles authentication headers, JSON bodies, form data, and custom headers automatically.

Chmod calculator generates Unix/Linux file permission codes using read, write, and execute permissions for owner, group, and others. The Chmod Calculator provides a visual interface where you check permission boxes and get the numeric code (like 755 or 644). This prevents permission errors that expose files or break scripts. Common patterns include 644 for web files (owner reads/writes, others read), 755 for directories and executables (owner full access, others read and execute), and 600 for private files (owner-only access). Understanding permissions prevents security vulnerabilities from overly permissive files.

IBAN validation checks International Bank Account Numbers using country-specific formats and mod-97 check digits. The IBAN Validator verifies country code, length, and checksum in one step. Valid IBANs have 2-letter country codes, 2 check digits, then country-specific account details, totaling 15-34 characters. Validation catches typos in payment forms, confirms SEPA transfers, and validates customer-provided bank details. The validator details which validation step failed, helping users correct mistakes. IBANs replace older account numbers in European banking and international transfers.

Credit card number generation creates structurally valid test numbers that pass Luhn algorithm validation without being real, active cards. The Credit Card Generator produces numbers for Visa, Mastercard, American Express, and other networks, useful for testing payment gateway integration, e-commerce checkout flows, and form validation. Generated numbers pass format validation but fail authorization because they are not assigned to real accounts. Never use real credit card numbers in development or testing. Always use generators or official test numbers provided by payment processors for sandbox environments.

These tools form an API development and security testing toolkit. Decode JWT tokens when debugging authentication, convert cURL examples when integrating APIs, calculate file permissions when deploying applications, validate IBANs in payment forms, and generate test cards when building checkout flows. Together they cover common API security and testing scenarios.

Popular Workflows

Common ways professionals use these tools together

Debug API Authentication Issue

  1. 1

    Copy JWT token from browser dev tools

    JWT Decoder

  2. 2

    Decode token to inspect claims

    JWT Decoder

  3. 3

    Verify user ID and permissions are correct

    JWT Decoder

Create a Local Auth Mock

  1. 1

    Generate a test token with the right claims

    JWT Generator

  2. 2

    Decode the result to inspect the header and payload

    JWT Decoder

  3. 3

    Sign related payloads for request or webhook testing

    HMAC Generator

Integrate Third-Party API

  1. 1

    Copy cURL example from API docs

    cURL to Fetch Converter

  2. 2

    Convert to JavaScript Fetch code

    cURL to Fetch Converter

  3. 3

    Add converted code to application

    cURL to Fetch Converter

Deploy Web Application

  1. 1

    Set file permissions for upload directory

    Chmod Calculator

  2. 2

    Configure executable permissions for scripts

    Chmod Calculator

  3. 3

    Secure config files with restricted access

    Chmod Calculator

Test Payment Gateway Integration

  1. 1

    Generate test credit card numbers

    Credit Card Generator

  2. 2

    Test checkout flow with generated cards

    Credit Card Generator

  3. 3

    Verify payment validation logic

    Credit Card Generator

Verify a Signed Webhook Workflow

  1. 1

    Generate an HMAC for the sample payload with the shared secret

    HMAC Generator

  2. 2

    Compare the generated signature with the expected header value

    HMAC Generator

  3. 3

    Encrypt any temporary secrets or notes you need to share safely

    AES Encrypt

Verify a Release Artifact

  1. 1

    Hash the downloaded file locally

    Checksum Calculator

  2. 2

    Compare the result with the published checksum

    Checksum Calculator

  3. 3

    Decrypt protected notes or payloads if you need to recover the original text

    AES Decrypt

Plan an IPv4 Network Segment

  1. 1

    Calculate the subnet boundaries from an IP and subnet mask

    Subnet Calculator

  2. 2

    Confirm the same range in CIDR notation for documentation or routing

    CIDR Calculator

  3. 3

    Convert individual IPv4 addresses into decimal or hex for tooling compatibility

    IP Address Converter

Frequently Asked Questions

Everything you need to know about api & security tools for developers

Can I verify JWT signature with the decoder?

No, signature verification requires the secret key only your server knows. The JWT Decoder shows header and payload contents but cannot verify authenticity. This is intentional for security since sharing secrets with online tools would compromise security. Verify signatures server-side with your authentication library using the secret key.

Is it safe to decode JWT tokens online?

Only decode development or expired tokens. Never paste production tokens containing real user data into any online tool, including this one, as tokens could be logged or intercepted. For production debugging, use local tools, command-line utilities, or server-side logging. Browser-based decoders process locally but avoid risk by only using test tokens.

Why does converted Fetch code not work exactly like cURL?

Browsers enforce CORS restrictions that cURL ignores, and some authentication schemes work differently in JavaScript. The converter produces equivalent code, but you may need to adjust for CORS, authentication flow, or error handling. Test converted code in your target environment and adjust as needed. The conversion provides a solid starting point but may require refinement.

What file permissions should I use for uploaded files?

Use 644 (rw-r--r--) for regular files, 755 (rwxr-xr-x) for directories and scripts, 600 (rw-------) for config files with secrets, and 700 (rwx------) for private directories. Never use 777 (full access) in production as it allows anyone to modify files. The chmod calculator helps visualize permissions before applying them.

Are generated credit card numbers real?

No. Generated numbers are structurally valid and pass Luhn checksum validation but are not assigned to actual accounts. They fail authorization with payment processors. Use these only in test/sandbox environments, never for fraud. Payment gateways also provide official test card numbers that trigger specific scenarios (success, decline, etc.).

How does IBAN validation work?

IBAN validation checks country code (2 letters), check digits (2 numbers), and account details using mod-97 algorithm. Rearrange IBAN (move first 4 characters to end), convert letters to numbers (A=10, B=11, etc.), then calculate modulo 97. Result must equal 1 for valid IBAN. The validator handles this automatically and reports which validation step failed.

Can I use these tools in production?

JWT decoder and chmod calculator are useful in production for debugging and configuration. cURL converter is primarily for development. IBAN validator works in production for form validation. Never use credit card or IBAN generators in production as they create fake data only suitable for testing. Always use real validated data in production systems.

What is the Luhn algorithm for credit cards?

Luhn algorithm detects typos in credit card numbers by validating the checksum. Double every second digit from right, sum all digits (treating doubled values over 9 as two digits), and if sum modulo 10 equals zero, the number is valid. This catches most typos but does not verify the card exists or has funds. The credit card generator creates numbers that pass Luhn validation.

Related Collections

Collections that complement and enhance your current selection

Explore More Collections

Discover additional tools and resources to expand your toolkit

Need More Tools?

Explore our complete collection of free, browser-based tools for all your design and development needs.

Browse All Tools