Free, browser-based utilities for everyday developer workflows

JWT & OAuth Security Toolkit

Decode, sign, and verify JSON Web Tokens (HS256/384/512, RS256, ES256) and generate OAuth PKCE code_challenges and authorization URLs. Everything runs 100% in your browser.

  • Sign and verify JWTs (HS256/384/512, RS256, ES256).
  • Generate PKCE code_verifier and code_challenge.
  • Build OAuth authorization URLs for debugging flows.
  • Share results: Generate a secure link to share your current input and results with teammates — nothing is uploaded to any server.

Quick examples

No data leaves your browser.

Choose a workflow

Start with the part of the auth workflow you need. Switching sections keeps your current inputs in place.

JWT Decode

Token input

Header

Payload

Signature (base64url)

How to use the JWT & OAuth Security Toolkit

Sign, verify, and inspect JSON Web Tokens with the full set of algorithms used in production: HS256 / HS384 / HS512 (HMAC), RS256 / RS384 / RS512 (RSA), ES256 / ES384 (ECDSA), PS256 / PS384 / PS512 (RSA-PSS), and EdDSA. Generate OAuth 2.0 PKCE code verifier / challenge pairs (S256) for SPA, mobile, and CLI flows. Signing keys and HMAC secrets never leave your browser — all crypto runs locally via Web Crypto. Use this to debug login failures, test new auth integrations, simulate identity-provider responses, and verify what your backend really expects.

What it does

When to use it

How to use it

  1. Pick the algorithm your backend expects (HS256 for shared secrets, RS256 / ES256 for asymmetric).
  2. Provide the HMAC secret (HS) or the key pair (RS / ES / PS / EdDSA) in PEM or JWK form.
  3. Edit the header and payload JSON to match what your service issues.
  4. Click Sign to produce a JWT, then paste it back into Verify to confirm the round trip.
  5. For OAuth flows, switch to the PKCE tab to generate a verifier / challenge pair.
  6. Inspect existing tokens with the JWT Decoder; convert public keys with the JWK / JWKS / PEM Converter.

Tips & pitfalls

FAQ

Related tools

Runs locally in your browser via Web Crypto. No uploads. HMAC secrets and private keys never leave your machine.