Example
Input
255
Output (all bases at once)
Binary (2): 11111111 Octal (8): 377 Decimal (10): 255 Hex (16): ff Base64 hint: 2-digit hex per byte
Note
Converts among decimal, hex, binary, octal, and any arbitrary base 2-36. Negatives are shown with a sign prefix (`-0xFF`). Floats are truncated to the integer part.
Usage / FAQ
When to use
- Debug bit masks — what does 0xFF equal in decimal?
- Compare hex vs decimal Unicode codepoints (U+5B57 = 23383)
- Interpret chmod / permissions octal values (0o755, …)
- Convert each channel of a hex color to decimal
- Learn embedded systems and bitwise operations
FAQ
- Q.Why up to base 36?
- A.0-9 (10) + a-z (26) = 36 — the largest base expressible with Latin alphanumerics, and the limit of JavaScript's `Number.toString(36)`. Often used for short URL generation.
- Q.How are negatives shown?
- A.Sign-magnitude format — `-255` becomes `-0xFF` / `-11111111`. If you need the machine representation (two's complement), use an additional step.
- Q.What about floats?
- A.Only the integer part converts. `3.14` becomes `3`. For the IEEE 754 bit pattern of a float, combine the hex tool with a dedicated converter.
Fun facts
The core of base-10 — positional notation with a true zero — was developed in India between the 5th and 7th centuries, then adopted in the 8th by Persian and Arab mathematicians who carried it to Europe. Hence 'Hindu-Arabic numerals' — invented in India, transmitted via Arabia.
Wikipedia — Hindu-Arabic numeralsThe modern explanation of binary is Leibniz's 1703 'Explication de l'Arithmétique Binaire' — which he reportedly arrived at after studying the 64 hexagrams of the Chinese I Ching. The fact that the notation underlying every digital computer 250 years later took inspiration from a religious text is delightful.
Wikipedia — Binary number historyOctal was popular in the PDP-11 era (1970s) because 12-, 24-, and 36-bit word systems mapped cleanly onto it, but it lost to 16 with the rise of the 8-bit byte. Today it survives mostly in Unix permission notation like `chmod 755` — 3 bits per digit lines up perfectly with rwx.
Wikipedia — Octal
Related tools
- Base64 Encode / Decode
Encode text to Base64 or decode Base64 back to text. Runs entirely in your browser, no data sent to any server.
- URL Encode / Decode
Percent-encode text for safe use in URLs, or decode percent-encoded URLs back to text. Runs entirely in your browser.
- UUID / ULID Generator
Generate UUID v4 (random), UUID v7 (time-ordered, RFC 9562), or ULID identifiers — all client-side via crypto.
- JWT Decoder
Decode the header and payload of a JSON Web Token. Signature is not verified (a public key is required). The token is processed entirely in your browser.
- JWT Encoder (HMAC)
Generate a signed JSON Web Token with HS256/HS384/HS512 (HMAC-SHA). Payload and secret stay in your browser — Web Crypto API based.
- SHA Hash
Compute SHA-1, SHA-256, SHA-384, or SHA-512 hash of text. Uses the browser's Web Crypto API; no data is sent to any server.
- Hex Encode / Decode
Encode text to hexadecimal or decode hex back to text. Supports UTF-8 multi-byte characters and tolerates whitespace.
- HTML Entity Encode / Decode
Encode HTML special characters (&, <, >, ", ') to entities, or decode named/numeric entities back to text.
- Password Generator
Generate cryptographically strong passwords, tokens, random strings, and passphrases with entropy display.
- URL Parser
Decompose a URL into protocol, host, path, query parameters, and hash — read-only inspection.
- HMAC Generator
Compute HMAC (Hash-based Message Authentication Code) with SHA-1/256/384/512 using the Web Crypto API.
- HMAC Verify
Verify whether a given HMAC signature matches the message + secret. Constant-time comparison via Web Crypto API.
- MD5 Hash
Compute MD5 hash for text. Note: MD5 is broken for security — checksums and legacy compatibility only.
- Punycode (IDN)
Convert international domain names to/from Punycode (xn-- encoded ASCII). Uses native URL parser.
- HTTP Status Codes
Browse and search HTTP status codes (1xx-5xx) with descriptions and common usage.
- User-Agent Parser
Parse User-Agent strings into browser, OS, device, and engine fields.
- Bcrypt Hash
Hash passwords with Bcrypt or verify a plaintext against an existing hash. Configurable salt rounds.
- Cookie Parser
Parse Cookie or Set-Cookie strings into a table. Decode percent-encoded values. Supports Set-Cookie attributes (Path/Domain/Max-Age/SameSite/HttpOnly/Secure).
- IP / CIDR Calculator
Compute network address, broadcast, host range, mask, and host count from an IPv4 + CIDR.
- cURL Builder
Build cURL commands from URL/method/headers/body. Auto-detects JSON content-type.