Back to Collections

API & Security Tools

Debug APIs and test security implementations. Decode JWT tokens, calculate Linux permissions, convert cURL commands, validate IBANs, and generate test credit cards for development.

10 min read
Updated 2025-12-13

API development and security testing require specialized tools for debugging authentication, converting HTTP requests, validating financial data, and testing payment integrations. Developers need to decode JWT tokens without exposing secrets, convert API documentation examples to code, validate international bank accounts, test payment gateways with dummy data, and configure file permissions correctly.

These tools handle API debugging, security configuration, and testing scenarios without requiring production credentials or risking security breaches. Decode JWT tokens to inspect claims, convert cURL commands to Fetch API code, calculate Unix file permissions visually, validate IBAN formats, and generate test credit card numbers that pass validation for sandbox testing.

Perfect for API developers debugging authentication, DevOps engineers configuring servers, fintech developers testing payment flows, security professionals auditing systems, and anyone working with web APIs or server administration. All tools process data locally without external requests.

How to Use These Tools

Step-by-step guidance and best practices for getting the most out of this collection

JWT (JSON Web Token) tokens authenticate API requests by encoding user identity and claims in three parts: header, payload, and signature. The JWT Decoder parses these sections without validating the signature, letting you inspect claims like user ID, expiration time, and permissions. This helps debug authentication issues, verify token contents during development, and understand API authorization. Never paste production tokens with real user data into online tools. The decoder shows decoded JSON but cannot verify signatures, which requires the secret key only your server knows.

cURL to Fetch conversion transforms command-line API examples into JavaScript code for browser or Node.js applications. API documentation often provides cURL examples because they are concise and platform-independent. The cURL to Fetch Converter parses cURL syntax, extracting URL, headers, request body, and HTTP method, then generates equivalent JavaScript Fetch API code. This accelerates integrating third-party APIs by converting documentation examples directly to working code. The converter handles authentication headers, JSON bodies, form data, and custom headers automatically.

Chmod calculator generates Unix/Linux file permission codes using read, write, and execute permissions for owner, group, and others. The Chmod Calculator provides a visual interface where you check permission boxes and get the numeric code (like 755 or 644). This prevents permission errors that expose files or break scripts. Common patterns include 644 for web files (owner reads/writes, others read), 755 for directories and executables (owner full access, others read and execute), and 600 for private files (owner-only access). Understanding permissions prevents security vulnerabilities from overly permissive files.

IBAN validation checks International Bank Account Numbers using country-specific formats and mod-97 check digits. The IBAN Validator verifies country code, length, and checksum in one step. Valid IBANs have 2-letter country codes, 2 check digits, then country-specific account details, totaling 15-34 characters. Validation catches typos in payment forms, confirms SEPA transfers, and validates customer-provided bank details. The validator details which validation step failed, helping users correct mistakes. IBANs replace older account numbers in European banking and international transfers.

Credit card number generation creates structurally valid test numbers that pass Luhn algorithm validation without being real, active cards. The Credit Card Generator produces numbers for Visa, Mastercard, American Express, and other networks, useful for testing payment gateway integration, e-commerce checkout flows, and form validation. Generated numbers pass format validation but fail authorization because they are not assigned to real accounts. Never use real credit card numbers in development or testing. Always use generators or official test numbers provided by payment processors for sandbox environments.

These tools form an API development and security testing toolkit. Decode JWT tokens when debugging authentication, convert cURL examples when integrating APIs, calculate file permissions when deploying applications, validate IBANs in payment forms, and generate test cards when building checkout flows. Together they cover common API security and testing scenarios.

Popular Workflows

Common ways professionals use these tools together

Debug API Authentication Issue

  1. 1

    Copy JWT token from browser dev tools

    JWT Decoder

  2. 2

    Decode token to inspect claims

    JWT Decoder

  3. 3

    Verify user ID and permissions are correct

    JWT Decoder

Integrate Third-Party API

  1. 1

    Copy cURL example from API docs

    cURL to Fetch Converter

  2. 2

    Convert to JavaScript Fetch code

    cURL to Fetch Converter

  3. 3

    Add converted code to application

    cURL to Fetch Converter

Deploy Web Application

  1. 1

    Set file permissions for upload directory

    Chmod Calculator

  2. 2

    Configure executable permissions for scripts

    Chmod Calculator

  3. 3

    Secure config files with restricted access

    Chmod Calculator

Test Payment Gateway Integration

  1. 1

    Generate test credit card numbers

    Credit Card Generator

  2. 2

    Test checkout flow with generated cards

    Credit Card Generator

  3. 3

    Verify payment validation logic

    Credit Card Generator

Explore More Collections

Discover more expert-curated tool collections for specific workflows and use cases

Frequently Asked Questions

Can I verify JWT signature with the decoder?

No, signature verification requires the secret key only your server knows. The JWT Decoder shows header and payload contents but cannot verify authenticity. This is intentional for security since sharing secrets with online tools would compromise security. Verify signatures server-side with your authentication library using the secret key.

Is it safe to decode JWT tokens online?

Only decode development or expired tokens. Never paste production tokens containing real user data into any online tool, including this one, as tokens could be logged or intercepted. For production debugging, use local tools, command-line utilities, or server-side logging. Browser-based decoders process locally but avoid risk by only using test tokens.

Why does converted Fetch code not work exactly like cURL?

Browsers enforce CORS restrictions that cURL ignores, and some authentication schemes work differently in JavaScript. The converter produces equivalent code, but you may need to adjust for CORS, authentication flow, or error handling. Test converted code in your target environment and adjust as needed. The conversion provides a solid starting point but may require refinement.

What file permissions should I use for uploaded files?

Use 644 (rw-r--r--) for regular files, 755 (rwxr-xr-x) for directories and scripts, 600 (rw-------) for config files with secrets, and 700 (rwx------) for private directories. Never use 777 (full access) in production as it allows anyone to modify files. The chmod calculator helps visualize permissions before applying them.

Are generated credit card numbers real?

No. Generated numbers are structurally valid and pass Luhn checksum validation but are not assigned to actual accounts. They fail authorization with payment processors. Use these only in test/sandbox environments, never for fraud. Payment gateways also provide official test card numbers that trigger specific scenarios (success, decline, etc.).

How does IBAN validation work?

IBAN validation checks country code (2 letters), check digits (2 numbers), and account details using mod-97 algorithm. Rearrange IBAN (move first 4 characters to end), convert letters to numbers (A=10, B=11, etc.), then calculate modulo 97. Result must equal 1 for valid IBAN. The validator handles this automatically and reports which validation step failed.

Can I use these tools in production?

JWT decoder and chmod calculator are useful in production for debugging and configuration. cURL converter is primarily for development. IBAN validator works in production for form validation. Never use credit card or IBAN generators in production as they create fake data only suitable for testing. Always use real validated data in production systems.

What is the Luhn algorithm for credit cards?

Luhn algorithm detects typos in credit card numbers by validating the checksum. Double every second digit from right, sum all digits (treating doubled values over 9 as two digits), and if sum modulo 10 equals zero, the number is valid. This catches most typos but does not verify the card exists or has funds. The credit card generator creates numbers that pass Luhn validation.

Need More Tools?

Explore our complete collection of free, browser-based tools for all your design and development needs.

Browse All Tools