Debug APIs, generate or inspect JWTs, encrypt sensitive text, sign requests, verify checksums, and inspect network settings. Decode tokens, create HS256 JWTs, calculate Linux permissions, convert cURL commands, analyze IPv4 networks, validate IBANs, and generate test payment data.
API development and security testing require specialized tools for debugging authentication, converting HTTP requests, validating financial data, and testing payment integrations. Developers need to decode JWT tokens without exposing secrets, convert API documentation examples to code, validate international bank accounts, test payment gateways with dummy data, and configure file permissions correctly.
These tools handle API debugging, security configuration, and testing scenarios without requiring production credentials or risking security breaches. Decode JWT tokens to inspect claims, generate test JWTs with HS256 or alg:none, encrypt sensitive notes with AES, generate HMAC signatures for webhooks and signed requests, calculate checksums for release verification, inspect IPv4 subnet and CIDR layouts, convert cURL commands to Fetch API code, calculate Unix file permissions visually, validate IBAN formats, and generate test credit card numbers that pass validation for sandbox testing.
Useful for API developers debugging authentication, DevOps engineers configuring servers, fintech developers testing payment flows, security professionals auditing systems, and anyone working with web APIs or server administration. All tools process data locally without external requests.
Step-by-step guidance and best practices for getting the most out of this collection
JWT (JSON Web Token) tokens authenticate API requests by encoding user identity and claims in three parts: header, payload, and signature. The JWT Decoder parses these sections without validating the signature, letting you inspect claims like user ID, expiration time, and permissions. The JWT Generator complements it by creating test tokens locally from JSON header and payload objects, with support for HS256 signing or alg:none for unsigned previews. Together they help debug authentication issues, verify token contents during development, and understand API authorization without leaving the browser.
AES encryption protects sensitive text by turning plaintext into ciphertext with a secret password and random parameters. The AES Encrypt tool creates AES-GCM payloads locally, while the AES Decrypt tool reverses compatible payloads back into plaintext with the original password. A PBKDF2-derived key converts your password into an encryption key, while random salt and IV values ensure the same plaintext does not always produce the same ciphertext. This is useful for private notes, internal config snippets, or exchanging sensitive strings without exposing them in plain text.
HMAC (Hash-based Message Authentication Code) signs a message with a shared secret so receivers can confirm the payload came from someone holding the same key and that the content was not altered. The HMAC Generator helps test webhook signature validation, signed query parameters, and API authentication flows. Unlike plain hashes, HMAC output depends on both the message and the secret, making it suitable for authenticity checks instead of simple integrity-only workflows.
Checksums provide integrity verification for files and text. The Checksum Calculator hashes content with SHA algorithms and can compare the result with an expected value you paste in. This is useful when validating release artifacts, downloaded backups, deployment bundles, or copied config text. Matching checksums suggest the content has not changed; mismatches signal corruption, truncation, or the wrong source file.
IPv4 network planning depends on understanding subnet masks, CIDR prefixes, wildcard masks, and host ranges. The Subnet Calculator and CIDR Calculator turn those values into concrete network boundaries, showing the network address, broadcast address, first and last usable hosts, and total host capacity. This helps when carving VLANs, documenting firewall rules, designing cloud address space, or debugging incorrect routing assumptions. The IP Address Converter complements those tools by translating IPv4 addresses into decimal, hexadecimal, and binary representations often seen in logs, low-level tooling, or vendor documentation.
cURL to Fetch conversion transforms command-line API examples into JavaScript code for browser or Node.js applications. API documentation often provides cURL examples because they are concise and platform-independent. The cURL to Fetch Converter parses cURL syntax, extracting URL, headers, request body, and HTTP method, then generates equivalent JavaScript Fetch API code. This accelerates integrating third-party APIs by converting documentation examples directly to working code. The converter handles authentication headers, JSON bodies, form data, and custom headers automatically.
Chmod calculator generates Unix/Linux file permission codes using read, write, and execute permissions for owner, group, and others. The Chmod Calculator provides a visual interface where you check permission boxes and get the numeric code (like 755 or 644). This prevents permission errors that expose files or break scripts. Common patterns include 644 for web files (owner reads/writes, others read), 755 for directories and executables (owner full access, others read and execute), and 600 for private files (owner-only access). Understanding permissions prevents security vulnerabilities from overly permissive files.
IBAN validation checks International Bank Account Numbers using country-specific formats and mod-97 check digits. The IBAN Validator verifies country code, length, and checksum in one step. Valid IBANs have 2-letter country codes, 2 check digits, then country-specific account details, totaling 15-34 characters. Validation catches typos in payment forms, confirms SEPA transfers, and validates customer-provided bank details. The validator details which validation step failed, helping users correct mistakes. IBANs replace older account numbers in European banking and international transfers.
Credit card number generation creates structurally valid test numbers that pass Luhn algorithm validation without being real, active cards. The Credit Card Generator produces numbers for Visa, Mastercard, American Express, and other networks, useful for testing payment gateway integration, e-commerce checkout flows, and form validation. Generated numbers pass format validation but fail authorization because they are not assigned to real accounts. Never use real credit card numbers in development or testing. Always use generators or official test numbers provided by payment processors for sandbox environments.
These tools form an API development and security testing toolkit. Decode JWT tokens when debugging authentication, convert cURL examples when integrating APIs, calculate file permissions when deploying applications, validate IBANs in payment forms, and generate test cards when building checkout flows. Together they cover common API security and testing scenarios.
Debug and convert API requests
Encrypt text, sign messages, and verify file or content integrity
Encrypt text locally with AES-GCM and password-based keys
Decrypt AES-GCM payloads locally with the original password
Generate keyed HMAC signatures for messages and API payloads
Calculate and verify SHA checksums for text or local files
Inspect IPv4 subnet layouts, CIDR blocks, and address formats
Configure file permissions and access control
Validate and generate financial test data
Common ways professionals use these tools together
Copy JWT token from browser dev tools
JWT Decoder
Decode token to inspect claims
JWT Decoder
Verify user ID and permissions are correct
JWT Decoder
Generate a test token with the right claims
JWT Generator
Decode the result to inspect the header and payload
JWT Decoder
Sign related payloads for request or webhook testing
HMAC Generator
Copy cURL example from API docs
cURL to Fetch Converter
Convert to JavaScript Fetch code
cURL to Fetch Converter
Add converted code to application
cURL to Fetch Converter
Set file permissions for upload directory
Chmod Calculator
Configure executable permissions for scripts
Chmod Calculator
Secure config files with restricted access
Chmod Calculator
Generate test credit card numbers
Credit Card Generator
Test checkout flow with generated cards
Credit Card Generator
Verify payment validation logic
Credit Card Generator
Generate an HMAC for the sample payload with the shared secret
HMAC Generator
Compare the generated signature with the expected header value
HMAC Generator
Encrypt any temporary secrets or notes you need to share safely
AES Encrypt
Hash the downloaded file locally
Checksum Calculator
Compare the result with the published checksum
Checksum Calculator
Decrypt protected notes or payloads if you need to recover the original text
AES Decrypt
Calculate the subnet boundaries from an IP and subnet mask
Subnet Calculator
Confirm the same range in CIDR notation for documentation or routing
CIDR Calculator
Convert individual IPv4 addresses into decimal or hex for tooling compatibility
IP Address Converter
Everything you need to know about api & security tools for developers
Collections that complement and enhance your current selection
Convert between all CSS units instantly. Transform pixels to REM, EM, viewport units, percentages, and print units for responsive design and cross-device compatibility.
Convert between data formats instantly. Transform JSON and YAML, JSON and XML, CSV to JSON, SQL to JSON, Markdown to HTML, and more for smooth data interchange and API integration.
Encode and decode text in multiple formats. Base64, URL encoding, binary, hexadecimal, and Unicode conversions for web development, APIs, and data transmission.
Generate essential web development files instantly. Create robots.txt, .htaccess redirects, Dockerfiles, cron schedules, and SQL helpers for faster development and deployment.
Professional code formatting and developer utility tools. Format HTML, SQL, YAML, and JSON, test regex, escape patterns, convert globs, or turn cURL commands into JavaScript Fetch.
Discover additional tools and resources to expand your toolkit
Professional pressure calculation tools for engineering, scientific, and industrial applications. Calculate atmospheric pressure, water pressure, vacuum levels, boiler pressure, and gas cylinder pressure with accuracy and safety guidelines.
Complete guide to color palette creation tools for brand identity, UI design, and creative projects. Expert-curated collection of the best free, browser-based color palette generators.
Convert PDFs to other formats. Transform PDFs to images, HTML, Markdown, or extract text for editing, archiving, and content reuse.
Professional color conversion tools for web development, CSS styling, and digital design. Convert between HEX, RGB, CMYK, HSL, LAB, and XYZ color formats instantly.
Calculate exact materials needed for home improvement projects. Get precise quantities for paint, tile, concrete, carpet, wallpaper, and mulch to avoid waste and overspending.
Convert sizing systems instantly. Transform shoe sizes, clothing sizes, ring measurements between US, UK, EU standards, plus Roman numeral conversions for accurate international shopping.
Explore our complete collection of free, browser-based tools for all your design and development needs.
Browse All Tools