Free, browser-based utilities for everyday developer workflows

Certificate & PEM Tools

Decode certificates and CSRs, inspect chains, match keys, and sanitize PEM bundles locally.

Mode

Certificate input

Summary

Raw JSON

Inspector

How to use the Certificate & PEM Tools

Decode X.509 certificates, inspect CSRs, view SANs and expiry dates, and split PEM bundles into individual blocks before configuring TLS, NGINX, HAProxy, load balancers, mTLS clients, or certificate renewal tasks. Useful for cert audits, mTLS troubleshooting, expiry tracking, and chain validation. Everything runs in your browser; certificates and CSRs are never uploaded.

What it does

When to use it

How to use it

  1. Pick the tab: X.509 Decode, CSR Viewer, or PEM Splitter.
  2. Paste the full PEM block (including -----BEGIN CERTIFICATE----- / -----END CERTIFICATE-----).
  3. Click Decode (or Split) — the parsed fields appear instantly.
  4. Copy individual blocks from the splitter into the leaf, intermediate, or chain files your server needs.
  5. For private keys and JWKs, use the JWK / JWKS / PEM Converter.

Tips & pitfalls

FAQ

Related tools

Runs locally in your browser. No uploads. Certificates and CSRs are parsed entirely in-browser.