1) Encryption & Decryption (AES‑GCM)
Uses real encryption in your browser (AES‑GCM). Your password is turned into a key using PBKDF2.
Output is Base64: salt + iv + ciphertext.
2) Hashing & Integrity (SHA‑256)
Hashing is a one‑way fingerprint used to detect changes.
3) File Hashing (SHA‑256)
Upload any document (PDF/DOCX/etc.) to generate its SHA‑256 “fingerprint”.
If the file changes (even 1 byte), the hash changes.
Compare two files (auto)
Upload 2 files and compare their SHA‑256 hashes.
4) Secure Password Generator
Generate strong passwords and see a basic strength estimate.
5) Phishing Link Scanner (Defensive)
Checks a URL for common warning signs and explains why it looks risky.
6) Digital Signatures (ECDSA P‑256)
Proves authenticity and integrity. Generate keys, sign text, verify signatures.
Paste Public Key + Message + Signature, then Verify.
7) Image Steganography (Encrypt‑then‑Hide)
Encrypts your message (AES‑GCM) with a Stego Key, then hides it in image pixels (LSB).
Same key is required to extract.
Canvas updates after hiding; download becomes available.