Security Tools Demo
Interactive cybersecurity tools to demonstrate password security, cryptographic hashing, and encryption concepts. All operations are performed locally in your browser.
CVE Search
Search the National Vulnerability Database for CVEs by keyword
Password Strength Analyzer
Test password strength and get real-time security feedback. All analysis is performed locally in your browser.
Hash Generator
Generate cryptographic hashes using various algorithms. Useful for file integrity verification and password storage.
About Cryptographic Hashing
- • Hashes are one-way functions - you cannot reverse them to get the original input
- • Same input always produces the same hash (deterministic)
- • Even tiny changes in input create completely different hashes
- • SHA-1 is deprecated due to collision vulnerabilities
- • SHA-256 is the current standard for most applications
Encryption/Decryption Demo
Simple demonstration of symmetric encryption concepts. This uses XOR cipher for educational purposes only - NOT secure for real use!
Educational Demo Only
This uses a simple XOR cipher for demonstration. For real encryption, use established libraries like Web Crypto API with AES-GCM.
This password will be used as the encryption key
How Symmetric Encryption Works
- • Same key is used for both encryption and decryption
- • Key must be kept secret and shared securely
- • Common algorithms: AES, ChaCha20, 3DES
- • Used for: File encryption, VPNs, HTTPS
- • Fast and efficient for large amounts of data