Runs entirely in-browser
Runs entirely in-browser — your plaintext passwords are never transmitted to any server.
500+ fast, free tools. Most run in your browser only; Image & PDF tools upload files to the backend when you run them.
Hash passwords with bcrypt (cost 8–14) and verify hashes in-browser.
bcrypt is the industry-standard algorithm for hashing passwords before storing them in databases. Unlike MD5 or SHA-1, bcrypt is intentionally slow and includes a configurable cost factor that makes brute-force attacks exponentially harder as hardware improves. This tool runs entirely in your browser using bcryptjs — your passwords never leave your device. Use the Generate tab to hash a password at cost factors 8 (fast, ~10ms) through 14 (slow, ~1.5s). The Verify tab checks whether a plaintext password matches a known hash, useful when debugging authentication flows or auditing stored credentials. A timing readout shows exactly how long each hash took so you can tune the cost for your application's performance budget.
Runs entirely in-browser — your plaintext passwords are never transmitted to any server.
Adjustable cost factor lets you benchmark the right security vs. performance tradeoff for your stack.
Instant verify tab removes the need to spin up a local Node.js script just to check a hash.
Benchmark timing readout helps you justify cost factor choices in security reviews.
Uses bcryptjs, the same library deployed in millions of production Node.js applications.
Runs entirely in-browser — your plaintext passwords are never transmitted to any server and there is no network request on hash or verify.
Input: Plaintext: correct horse battery staple Cost factor: 12
Output: $2a$12$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy Elapsed: ~340ms on a modern laptop
Input: Plaintext: correct horse battery staple Hash: $2a$12$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy
Output: Match — green badge confirms the plaintext produced this hash.
Input: Plaintext: incorrect-guess Hash: $2a$12$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy
Output: Mismatch — red badge; the candidate password did not produce this hash.
Input: Plaintext: bench-test Cost factor: 14
Output: Hash generated in ~1500ms — too slow for live login on this hardware; choose cost 12 instead for a ~100ms target.