Parse and decompose URLs into their component parts.
Analyze password strength, entropy, and estimated crack time.
Extract indicators of compromise (IPs, domains, hashes, URLs) from text.
Test and debug regular expressions with real-time matching.