Defang and refang URLs, IPs, and domains for safe sharing.
Parse and decompose URLs into their component parts.
Analyze password strength, entropy, and estimated crack time.
Extract indicators of compromise (IPs, domains, hashes, URLs) from text.