Calculator Tools
Free calculator tools for programming, math, finance, barcodes, and more. Generate QR codes, convert color values, compute hashes, decode JWTs, format JSON, format Unix timestamps, calculate loan amortization schedules.
| Tool | Description | Category |
|---|---|---|
| Investment Growth Calculator | Calculate growth of an investment from initial amount at a given interest rate with optional periodic contributions. | Financial |
| Loan Amortization Calculator | Calculate monthly payment, total cost of loan with interest, and graph loan amortization schedule based on loan amount, term, interest rate, and start date. | Financial |
| Strong Random Password Generator | Generate a strong random password using customizable settings. Keep your accounts secure by using a different password for each account and a password manager to keep track of your passwords. | Password |
| Unix Epoch Timestamp Converter | Convert Unix timestamps to human-readable dates and times in your local timezone and UTC. Supports timestamps in seconds, milliseconds, or microseconds. Includes output in RFC 3339, RFC 2822, and ISO 8601 formats. Unix time counts seconds since 00:00:00 UTC on January 1, 1970 (Unix epoch), with each day always exactly 86,400 seconds (leap seconds are ignored). | Programming |
| Cron Expression Parser | Parse and explain cron expressions. Supports standard 5-field and extended 6-field (with seconds) cron formats. Shows a human-readable description, next 10 execution times in UTC, and a detailed field breakdown. Supports wildcards, ranges, lists, steps, and named values (MON-SUN, JAN-DEC). | Programming |
| Number Base Converter | Convert numbers between binary (base 2), octal (base 8), decimal (base 10), and hexadecimal (base 16). Supports arbitrary precision integers, prefix formats (0b, 0o, 0x), negative numbers, and two's complement representation. | Programming |
| Color Picker and Converter | Pick colors visually and convert between HEX, RGBA, HSLA, HSV/HSB, and CMYK formats. | Programming |
| Keccak-256 Hash Calculator | Generate Keccak-256 256-bit / 32-byte message digest of a text string encoded in hex. Keccak-256 is the original Keccak algorithm before SHA-3 standardization. | Programming |
| BLAKE3 256-bit Hash Calculator | Generate BLAKE3 256-bit message digest of a text string encoded in hex. BLAKE3 is optimized for fastest performance and is several times faster than BLAKE2. BLAKE3 also supports high parallelism for performant processing of large input sizes. | Programming |
| BLAKE2b 512-bit Hash Calculator | Generate BLAKE2b 512-bit message digest of a text string encoded in hex. BLAKE2b provides higher performance (optimized for 64-bit platforms) than SHA-2 and SHA-3 with security on par with SHA-3 - it is immune to length extension attacks and indifferentiable from a random oracle. | Programming |
| BLAKE2b 256-bit Hash Calculator | Generate BLAKE2b 256-bit message digest of a text string encoded in hex. BLAKE2b-256 is widely used as a general-purpose hash offering higher performance than SHA-2 and SHA-3 with equivalent security. It is immune to length extension attacks and indifferentiable from a random oracle. | Programming |
| BLAKE2s 256-bit Hash Calculator | Generate BLAKE2s 256-bit message digest of a text string encoded in hex. BLAKE2s provides higher performance (optimized for 8-bit to 32-bit platforms) than SHA-2 and SHA-3 with security on par with SHA-3 - it is immune to length extension attacks and indifferentiable from a random oracle. | Programming |
| SHA-2 256-bit Hash Calculator | Generate SHA-2 (Secure Hash Algorithm 2 defined by FIPS PUB 180-2) 256-bit / 32-byte message digest of a text string encoded in hex. | Programming |
| SHA-2 224-bit Hash Calculator | Generate SHA-2 (Secure Hash Algorithm 2 defined by FIPS PUB 180-4) 224-bit / 28-byte message digest of a text string encoded in hex. SHA-224 is a truncated version of SHA-256 with different initial hash values. | Programming |
| SHA-2 384-bit Hash Calculator | Generate SHA-2 (Secure Hash Algorithm 2 defined by FIPS PUB 180-2) 384-bit / 48-byte message digest of a text string encoded in hex. | Programming |
| SHA-2 512-bit Hash Calculator | Generate SHA-2 (Secure Hash Algorithm 2 defined by FIPS PUB 180-2) 512-bit / 64-byte message digest of a text string encoded in hex. | Programming |
| SHA-512/224 Hash Calculator | Generate SHA-512/224 (defined by FIPS PUB 180-4) 224-bit / 28-byte message digest of a text string encoded in hex. SHA-512/224 uses the SHA-512 algorithm internally with different initial values and truncated output, making it more efficient than SHA-224 on 64-bit platforms. | Programming |
| SHA-512/256 Hash Calculator | Generate SHA-512/256 (defined by FIPS PUB 180-4) 256-bit / 32-byte message digest of a text string encoded in hex. SHA-512/256 uses the SHA-512 algorithm internally with different initial values and truncated output, providing resistance to length extension attacks and better performance on 64-bit platforms. | Programming |
| SHA-3 224-bit Hash Calculator | Generate SHA-3 (Secure Hash Algorithm 3 defined by FIPS PUB 202) 224-bit / 28-byte message digest of a text string encoded in hex. SHA-3 224-bit is the smallest output size in the SHA-3 family, based on the Keccak sponge construction. | Programming |
| SHA-3 256-bit Hash Calculator | Generate SHA-3 (Secure Hash Algorithm 3 defined by FIPS PUB 202) 256-bit / 32-byte message digest of a text string encoded in hex. SHA-3 256-bit is the most commonly used output size for general-purpose hashing. | Programming |
| SHA-3 384-bit Hash Calculator | Generate SHA-3 (Secure Hash Algorithm 3 defined by FIPS PUB 202) 384-bit / 48-byte message digest of a text string encoded in hex. | Programming |
| SHA-3 512-bit Hash Calculator | Generate SHA-3 (Secure Hash Algorithm 3 defined by FIPS PUB 202) 512-bit / 64-byte message digest of a text string encoded in hex. | Programming |
| SHA-1 Hash Calculator | Generate SHA-1 (Secure Hash Algorithm 1 defined by FIPS PUB 180-2) 160-bit / 20-byte message digest of a text string encoded in hex. SHA-1 should no longer be used as a secure hash function, use SHA-2 or SHA-3 family of algorithms instead. | Programming |
| MD5 Hash Calculator | Generate MD5 (Message-Digest algorithm 5 defined by RFC 1321) 128-bit / 16-byte message digest of a text string encoded in hex. MD5 should no longer be used as a secure hash function, use SHA-2 or SHA-3 family of algorithms instead. | Programming |
| RIPEMD-160 Hash Calculator | Generate RIPEMD-160 160-bit / 20-byte message digest of a text string encoded in hex. RIPEMD-160 is a cryptographic hash function designed in the open academic community and is notably used in Bitcoin address generation and PGP fingerprints. | Programming |
| Whirlpool Hash Calculator | Generate Whirlpool 512-bit / 64-byte message digest of a text string encoded in hex. Whirlpool is a cryptographic hash function based on a modified AES block cipher, adopted by the ISO/IEC 10118-3 standard and recommended by the NESSIE project. | Programming |
| CRC32 Checksum Calculator | Calculate the CRC32 (Cyclic Redundancy Check 32-bit) checksum of a text string encoded in hex. CRC32 is widely used for error detection in Ethernet, ZIP, PNG, and many other formats. CRC32 is not a cryptographic hash and should not be used for security purposes. | Programming |
| Adler-32 Checksum Calculator | Calculate the Adler-32 checksum of a text string encoded in hex. Adler-32 is a fast checksum algorithm used in the zlib compression library and rsync. Adler-32 is faster than CRC32 but provides weaker error detection. It is not a cryptographic hash. | Programming |
| URL Encoder | Encode a URL with percent-encoding. URL encoding is useful for representing characters outside of the ASCII range in URLs and embedding URLs inside of URL parameters. | Programming |
| URL Decoder | Decode a URL that was encoded with percent-encoding. URL encoding is useful for representing characters outside of the ASCII range in URLs and embedding URLs inside of URL parameters. | Programming |
| Base64 Encoder | Encode a text string with Base64 encoding. Base64 encoding is useful for representing binary data in text, or text serialization format such as JSON or XML. | Programming |
| Base64 Decoder | Decode a Base64 encoded string to text. Base64 encoding is useful for representing binary data in text, or text serialization format such as JSON or XML. | Programming |
| JWT Decoder | Decode a JSON Web Token (JWT) to view its header, payload, and signature. Useful for debugging and inspecting JWT tokens used in authentication and authorization. The contents of your JWT will not be saved anywhere. | Programming |
| UUID Generator (version 4) | Generate a Universally Unique IDentifier (UUID) version 4 (pseudo random), a random 128-bit identifier which can be considered unique. UUID is also known as Globally Unique IDentifier (GUID). | Programming |
| UUID Generator (version 1) | Generate a Universally Unique IDentifier (UUID) version 1 (time-based), a 128-bit identifier derived from the current timestamp and a random node. UUID is also known as Globally Unique IDentifier (GUID). | Programming |
| UUID Generator (version 5) | Generate a Universally Unique IDentifier (UUID) version 5 (name-based, SHA-1), a deterministic 128-bit identifier derived from a namespace and name. The same inputs always produce the same UUID. | Programming |
| UUID Generator (version 7) | Generate a Universally Unique IDentifier (UUID) version 7 (time-ordered), a 128-bit identifier that combines a Unix timestamp with random data for natural chronological sorting. Defined in RFC 9562. | Programming |
| JSON Formatter | Format a JavaScript Object Notation (JSON) string to make it pretty, easier to read, and validate the syntax. | Programming |
| YAML Formatter | Format a YAML Ain't Markup Language (YAML) string to make it pretty, easier to read, and validate the syntax. | Programming |
| XML Formatter | Format a Extensible Markup Language (XML) string to make it pretty, easier to read, and validate the syntax. | Programming |
| QR Code Generator | Create a QR code from a text string. QR code is a two-dimensional, matrix barcode with error correction that can encode up to 7,089 characters. QR codes can be scanned by phones to access links, payment information and augmented reality content for example. | Barcode and QR Code |
| PDF417 Barcode Generator | Create a PDF417 barcode from a text string. PDF417 a license free, public domain, linear barcode with error correction that can encode up to 1800 characters. PDF417 barcodes are used in transport, inventory management and identification. | Barcode and QR Code |
| UPC-E Barcode Generator | Create a UPC-E barcode from a numeric string. UPC-E is an 8 digit linear barcode used for scanning retail products in stores. UPC is also known as the Universal Product Code. | Barcode and QR Code |
| EAN-13 Barcode Generator | Create a EAN-13 barcode from a numeric string. EAN is a 13 digit linear barcode used to label retail products, and in wholesale ordering and accounting. EAN is also known as the International Article Number or the European Article Number | Barcode and QR Code |
| Code 39 Barcode Generator | Create a Code 39 barcode from a text string. Code 39 is a linear barcode that can encode up to 43 characters, including numbers, letters and some symbols. Code 39 is still used by some postal services. | Barcode and QR Code |
| Percentage Calculator | Calculate percentages of numbers. | Math |
| BMI Calculator | Calculate your Body Mass Index (BMI) using your height and weight. BMI is a measure of body fat based on height and weight that applies to adult men and women. | Health |