Network Tools

A collection of free, browser-based utilities for encoding, encryption, and network diagnostics. No sign-up required — your data stays on your device.

What are network tools?

Network tools help developers, system administrators, and security professionals inspect, diagnose, and manipulate data as it moves across the internet. From encoding payloads for safe transmission to generating cryptographic key pairs and auditing open ports, these utilities cover the most common day-to-day tasks in network and security work.

Available tools

ENCODE

URL & Base64 Encoder / Decoder

Instantly encode or decode URL percent-encoded strings and Base64 data. Supports both encode and decode directions with a one-click swap. Everything runs client-side — your data never leaves your browser.

URLBase64Encoding
PGP

PGP Key Generator

Generate RSA or ECC PGP public and private key pairs in seconds. Set a passphrase, key size, expiry date, and optional comment. Download your keys as standard .asc files compatible with GPG, Thunderbird, and ProtonMail.

EncryptionRSAECCSecurity
PORT

Port Checker

Check whether a TCP port on any host is open, closed, or filtered. Diagnose firewall rules, confirm services are running, and audit exposed ports. Includes a quick-fill list of common port numbers for fast testing.

TCPFirewallDiagnostics

Frequently Asked Questions

Is my data safe when using these tools?

Yes. The encoder/decoder and PGP key generator run entirely inside your browser using JavaScript — nothing is transmitted to any server. The port checker does make a server-side TCP connection to the host you specify, but it only tests connectivity and does not store the results.

What is the difference between URL encoding and Base64?

URL encoding (percent encoding) transforms characters that are unsafe or reserved in URLs — such as spaces, ampersands, and hashes — into their %XX hexadecimal equivalents. Base64 converts arbitrary binary data into a set of 64 printable ASCII characters, making it suitable for embedding binary content (like images or files) inside text-based formats such as HTML, JSON, or email headers.

What can I use PGP keys for?

PGP (Pretty Good Privacy) key pairs are used to encrypt and digitally sign data. Common uses include encrypting sensitive emails so only the intended recipient can read them, signing software releases to prove authenticity, and securing file transfers. The public key is shared openly; the private key is kept secret and protected by a passphrase.

Why would a port show as filtered rather than closed?

A filtered port does not respond at all — a firewall or network device is silently dropping packets before they reach the host. A closed port, by contrast, actively sends back a TCP reset (RST) packet, confirming the host is reachable but nothing is listening on that port. Filtered results typically indicate a firewall rule is in effect.

Which algorithm should I choose for PGP key generation?

For most users, ECC (Curve25519) is the modern recommended choice — it produces smaller keys that are faster to use while offering equivalent security to much larger RSA keys. RSA remains the most widely compatible option and is a safe choice for any PGP software. If maximum compatibility with older systems is a priority, choose RSA 2048 or RSA 4096.

How do I find which ports my system is currently using?

On Windows, open Command Prompt and run netstat -an. On macOS or Linux, use netstat -an or ss -tuln in the terminal. These commands list all active connections and ports in the LISTEN state, giving you a clear picture of what services are exposed.