Image To Base64
An online tool for converting image to Base64 strings. Click or drag the image to convert.
Upload image
CoinTab - New tab page
A personalized new tab page for cryptocurrency enthusiasts, free to add markets, websites, HD wallpapers, provide profit analysis and early warnings, and help you keep abreast of market changes
Coin Space(Chrome)
A must-have plug-in for currency speculation! Pay attention to the latest prices in real time, comprehensively integrate exchange trends such as OKX, Binance, CoinEx, etc., add markets and warnings freely, and keep abreast of market changes at any time.
Coin Space(Edge)
A must-have plug-in for currency speculation! Pay attention to the latest prices in real time, comprehensively integrate exchange trends such as OKX, Binance, CoinEx, etc., add markets and warnings freely, and keep abreast of market changes at any time.
Warmer - New tab page
It redefines your Chrome new tab page. Compared to the new tab page that comes with Chrome, the new tab page is no longer a blank search, but contains many useful functions.
MD5
MD5 is a widely used hash function. It's been used in a variety of security applications and is also commonly used to check the integrity of files
SHA1
The SHA hash functions were designed by the National Security Agency (NSA). SHA-1 is the most established of the existing SHA hash functions, and it's used in a variety of security applications and protocols. Though, SHA-1's collision resistance has been weakening as new attacks are discovered or improved.
SHA224
In February 2004, a change notice was issued for FIPS PUB 180-2 to include an additional variant SHA-224, which was defined to comply with the key length required for dual-key 3DES
SHA256
SHA-256 is one of the four variants in the SHA-2 set. It isn't as widely used as SHA-1, though it appears to provide much better security.
SHA384
The five algorithms of the SHA family, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512, were designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). It's a U.S. government standard. The latter four are sometimes called SHA-2 together.
SHA512
SHA-512 is largely identical to SHA-256 but operates on 64-bit words rather than 32.
SHA3
SHA-3 is the winner of a five-year competition to select a new cryptographic hash algorithm where 64 competing designs were evaluated.
RIPEMD160
RIPEMD-160 is a modified version of MD4 that generates 20-byte digest values and is almost as secure as SHA-1 (note that the SHA-1 standard does not say how the K value is determined, which is very suspicious). RIPEMD-160 can be thought of as two MD4 computates in parallel, and if two threads are used, the performance will not be much different.
HmacMD5
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
HmacSHA1
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
HmacSHA224
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
HmacSHA256
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
HmacSHA384
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
HmacSHA512
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
HmacRIPEMD160
Keyed-hash message authentication codes (HMAC) is a mechanism for message authentication using cryptographic hash functions. HMAC can be used in combination with any iterated cryptographic hash function.
PBKDF2
PBKDF2 is a password-based key derivation function. In many applications of cryptography, user security is ultimately dependent on a password, and because a password usually can't be used directly as a cryptographic key, some processing is required. A salt provides a large set of keys for any given password, and an iteration count increases the cost of producing keys from a password, thereby also increasing the difficulty of attack.
AES
The Advanced Encryption Standard (AES) is a U.S. Federal Information Processing Standard (FIPS). It was selected after a 5-year process where 15 competing designs were evaluated.
DES
DES is a previously dominant algorithm for encryption, and was published as an official Federal Information Processing Standard (FIPS). DES is now considered to be insecure due to the small key size.
Triple DES
Triple DES applies DES three times to each block to increase the key size. The algorithm is believed to be secure in this form.
Rabbit
Rabbit is a high-performance stream cipher and a finalist in the eSTREAM Portfolio. It is one of the four designs selected after a 3 1/2-year process where 22 designs were evaluated.
RC4
RC4 is a widely-used stream cipher. It's used in popular protocols such as SSL and WEP. Although remarkable for its simplicity and speed, the algorithm's history doesn't inspire confidence in its security.
RC4Drop
It was discovered that the first few bytes of keystream are strongly non-random and leak information about the key. We can defend against this attack by discarding the initial portion of the keystream. This modified algorithm is traditionally called RC4-drop.
Super Encoder & Decoder
A small tool for converting Base64, Hex, Utf8, Utf16, Utf16LE, and Latin1 types to each other
Hex Encoder & Decoder
Hex and string conversion tool
Base64 Encoder & Decoder
Base64 and string conversion tool
Simplified & Traditional converter
A tool for converting simple Chinese fonts to each other, which supports both simple to simple and simple to complex, and the conversion speed is fast
Microsoft Translator
Quickly translate words and phrases between English and more than 100 languages.
JSON Formatter
A powerful online tool that allows users to format, validate, and validate JSON code, with syntax highlighting, expandable and collapsible nodes, and advanced options such as custom indentation
ABI Decoder
Ethereum ABI Decoder. Free online tool for quickly decoding hex input data values to human readable values. Recommended for Ethereum developers.
TON Tools
Some online practical tools for The Open Network(TON), including mnemonics to generate private and public keys, generate addresses, address conversion, send TON, etc.
Decode Raw Transaction
Decode Bitcoin, Litecoin, Dogecoin mainnet and testnet raw transactions online
ADA Tools
Some online practical technical tools for ADA (Cardano), including mnemonics to generate private and public keys, generate addresses, address conversion, send ADA, pledge, multi-signature wallets, etc.
QrCode Generator
Online QR code utility tool, enter text content, URL and other information in the input box, and the corresponding QR code will be generated immediately
Life Calculator
How many days have passed in your life, how many days are left, use numbers to measure life, a tool to calculate your life time. Life span is predetermined by heaven, so don't worry about it. Cherish every day is the most important thing.
Tetris
Experience classic games online, reminisce about childhood and find back childhood memories
QrCode Reader
Parse QR codes online, read the QR code content and display the content text
Image To Base64
An online tool for converting image to Base64 strings. Click or drag the image to convert.