Password, SSL, IP, and hash utilities — 3 tools available
4 modes, live entropy + crack-time, bulk + CSV, HIBP breach check.
8 weakness patterns, 4 attacker tiers, zxcvbn-style scoring.
5 algorithms + HMAC + file hashing + compare, all in browser.