Security Tools

Security Decoder

Paste anything suspicious — JWT, hash, URL, domain, IP, PowerShell, JavaScript, email header, HTTP request, HTTP headers, Base64, hex, URL-encoded strings, log lines, and more. Format is detected automatically. All analysis is local — nothing leaves your browser.

Try an example:

Frequently asked questions

How do I decode a JWT token online?
Paste your JWT into the input and click Analyze. The tool auto-detects it, decodes header and payload, checks the algorithm (including dangerous alg:none), validates expiry, and flags security issues — all locally in your browser.
How do I identify what type of hash I have?
Paste the hash string. Security Decoder identifies MD5, SHA-1/224/256/384/512, NTLM, bcrypt, and argon2 by length and format. Includes a direct VirusTotal lookup link for file hashes.
How do I decode a PowerShell encoded command?
Paste the full command (e.g. powershell -enc ...). The tool Base64-decodes the payload, reconstructs the script, and flags download cradles, LOLBins, AMSI bypass attempts, and obfuscation.
How do I analyze a suspicious phishing URL?
Paste the URL. The analyzer checks for homoglyph characters, brand impersonation, tracking parameters, open redirects, and injection patterns — no server involved.
Is it safe to paste sensitive data?
Yes. All analysis is client-side JavaScript — nothing is sent to any server or stored. Shareable links use hash fragments (#q=), which are never sent in HTTP requests or Referer headers.

Supported formats

URL Parses scheme, host, path, query — detects tracking params, homoglyphs, brand impersonation, injection patterns
Domain Checks TLD risk, typosquatting, brand keywords, homoglyph substitutions — VirusTotal & WHOIS links
IPv4 Classifies address range — links to ipinfo.io (geo/ASN), AbuseIPDB, Shodan, and VirusTotal for public IPs
JWT Decodes header & payload, checks algorithm, expiry, and security issues
Hash Identifies MD5, SHA-1/224/256/384/512, NTLM, bcrypt, argon2 — VirusTotal lookup link included
PowerShell Decodes -EncodedCommand, detects download cradles, LOLBins, AMSI bypass, obfuscation
JavaScript Decodes eval/atob/fromCharCode/unescape, detects DOM injection, redirects, obfuscation patterns
Email Header SPF, DKIM, DMARC, Received chain, originating IP, phishing signals
HTTP Request Parses method, path, headers, body — detects injection points and scanner signatures
HTTP Headers Analyzes security headers: CSP, HSTS, X-Frame-Options, and more
Base64 / Hex Decodes to text or hex dump, detects nested encoding
URL-encoded Decodes %XX percent-encoding, detects XSS, SQLi, and path traversal
Log Line Parses CLF, syslog (RFC 3164/5424), Windows Event Log, and generic ISO timestamp lines