Developer Text Toolkit
Count text, encode/decode Base64 and URLs, compare text, decode JWTs, generate hashes and UUIDs, and test regex locally.
This tool runs in your browser. Inputs stay local and are not sent to any server.
How to use this result
Developer text work often starts with a tiny task: count bytes, decode a value, compare two snippets, generate a UUID, or check whether a regular expression really matches. Keeping those tasks in one workspace reduces context switching.
The toolkit is designed for inspection and transformation, not for production authentication. JWT decoding only reads the header and payload; it does not prove that a token is valid or trusted.
Hash and UUID outputs are convenient for fixtures, cache keys, examples, and debugging notes. They should not replace a reviewed security library for password storage, signing, or cryptographic protocols.
All normal transformations run in the browser. Even so, production secrets, private keys, access tokens, and customer data should stay out of public web tools unless you have a deliberate internal policy for that workflow.
Examples
JWT inspection
Release note diff
API payload helper
Common questions
Q.Does this validate JWT signatures?
No. It decodes header and payload only. Signature verification needs the issuer secret or public key and must happen in a trusted environment.
Q.Can I paste production API keys here?
Avoid doing that. The tool is browser-local for normal operations, but secret handling should remain inside approved internal tooling.
Q.Are generated hashes suitable for passwords?
No. Password storage needs salted, slow password hashing such as bcrypt, scrypt, or Argon2.
Data handling notice
Browser-local processing: the main calculation or conversion runs in your browser.
No server storage: except for UI preferences such as favorites, ZHS does not store your input files or text on the server.
Sensitive-data caution: even with local processing, avoid entering production secrets, national IDs, financial data, or raw customer data into public web tools.