Analyze password strength, entropy, and estimated crack time.
Parse and decompose URLs into their component parts.
Extract indicators of compromise (IPs, domains, hashes, URLs) from text.
Test and debug regular expressions with real-time matching.