Valid HS256
- Correct JWT + correct shared secret -> Signature valid
security validator
Validate HS256 JWT signatures with a shared secret, fully client-side—no tokens or secrets ever leave your browser.
Supports HS256 (HMAC SHA-256) only; expects alg: HS256 in the header.
Requires a full JWT (header.payload.signature) and the matching shared secret.
Uses client-side HMAC to recompute the signature and compare against the JWT.
Runs fully client-side/offline—tokens and secrets stay in your browser.
JWT
Paste the full token with three base64url parts separated by dots. Use non-production tokens whenever possible.
Shared secret
Use a non-production shared secret for local verification; it must exactly match the signer’s key (case-sensitive).
This HS256 JWT signature validator recomputes the HMAC in your browser to confirm token integrity without uploading secrets or tokens.
Use it for fast QA of webhook/auth flows, then run full RS/ES verification and claim checks in your server or CI pipeline when needed.
developer
JWT Decoder
Decode JWT headers and payloads client-side—no uploads, no signature verification, and no storage.
security
Password Strength Checker
Score password strength with clear, local checks—length, variety, and guidance without sending data anywhere.
security
Password Entropy Calculator
Estimate password entropy (bits) in-browser to see how length and character sets impact strength.
web
HTTP Security Headers Validator
Validate core security headers (HSTS, nosniff, frame options, referrer policy, permissions policy) entirely client-side.
developer
Regex Tester
Test regex patterns against sample text with live matches and errors.
developer
UUID Validator
Check UUIDs (v1–v5) for proper formatting before using them in requests or logs.
JWTs and secrets stay in your browser. No data is sent, logged, or stored.
Signature integrity check for HS256 only; does not validate claims, expiry, or RS/ES algorithms.