Crypto & Privacy Suite

Local text encryption, offline vault export, email obfuscation, hashing, and simple image steganography.

Encrypt or decrypt notes

Result

Waiting for input...

Runs with browser WebCrypto AES-GCM and PBKDF2. Nothing is uploaded.

Create an offline vault file

Status

The generated HTML file opens offline and decrypts locally in the browser.

This replaces the separate encrypted-vault workflow with the same local crypto engine as Text Encryptor.

Obfuscate email markup

Generated code

Enter an email address...

This protects against basic scraping bots. It does not stop advanced crawlers that execute JavaScript.

Hash text or files

SHA-256

Waiting for text or file...

Hide message in image pixels

Selected image preview

Extracted message

Load an image first...

Simple LSB steganography for PNG export. Editing or recompressing the output image may destroy the hidden message.

? How to Use Crypto & Privacy Suite

  1. Open the tool directly in your browser — fully private.
  2. Enter your data, password, or text into the input field.
  3. Select the desired security algorithm or strength settings.
  4. Click the action button to generate or analyze the result.
  5. Copy or download your output. All processing stays on your device.

Why Use This Tool

  • 100% Free — No account, subscription, or payment required.
  • Privacy First — All processing happens in your browser. Your files never leave your device.
  • No Installation — Works directly in any modern browser on any device.
  • Instant Results — Get your output in seconds without waiting for server processing.

Frequently Asked Questions

Are the passwords generated by this tool stored anywhere?

No. Password generation uses your browser's built-in cryptographically secure random number generator (window.crypto). Nothing is stored, logged, or transmitted.

How strong is a randomly generated 16-character password?

A 16-character password using uppercase, lowercase, numbers, and symbols has approximately 95^16 possible combinations — far beyond practical brute-force capability with current computing hardware.

Can I use these security tools for professional or enterprise work?

Yes. All tools are built on standard cryptographic specifications. The hash tools use SHA-256 and MD5 per their official specifications, making them suitable for verification and professional use.

' + escapeHtml(title) + '

' + escapeHtml(title) + '