Hashing a user password at cost 12
Input: Plaintext: correct horse battery staple Cost factor: 12
Output: $2a$12$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy Elapsed: ~340ms on a modern laptop
500+ fast, free tools. Most run in your browser only; Image & PDF tools upload files to the backend when you run them.
Hash passwords with bcrypt (cost 8–14) and verify hashes in-browser.
bcrypt is the industry-standard algorithm for hashing passwords before storing them in databases. Unlike MD5 or SHA-1, bcrypt is intentionally slow and includes a configurable cost factor that makes brute-force attacks exponentially harder as hardware improves. This tool runs entirely in your browser using bcryptjs — your passwords never leave your device. Use the Generate tab to hash a password at cost factors 8 (fast, ~10ms) through 14 (slow, ~1.5s). The Verify tab checks whether a plaintext password matches a known hash, useful when debugging authentication flows or auditing stored credentials. A timing readout shows exactly how long each hash took so you can tune the cost for your application's performance budget.
Input: Plaintext: correct horse battery staple Cost factor: 12
Output: $2a$12$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy Elapsed: ~340ms on a modern laptop
Input: Plaintext: correct horse battery staple Hash: $2a$12$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy
Output: Match — green badge confirms the plaintext produced this hash.
Input: Plaintext: incorrect-guess Hash: $2a$12$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy
Output: Mismatch — red badge; the candidate password did not produce this hash.
Input: Plaintext: bench-test Cost factor: 14
Output: Hash generated in ~1500ms — too slow for live login on this hardware; choose cost 12 instead for a ~100ms target.