Private Sector Cyber Intelligence Solutions.

Digital Business Card

WelbourneSecurity

BSc (Hons) Cybersecurity

Scan to open the site, read the latest writeups, and get straight to the links that matter.

QR code linking to welbournesecurity.github.io/WelbourneSecurity/ Scan To Open

Live Footprint Snapshot

Inspecting browser exposure... This panel shows the quick browser details exposed immediately on page load.
Public IP Looking up...
Browser Detecting...
Operating System Detecting...
Language Detecting...
Time Zone Detecting...

Writeups

Published writeups.

Loading writeups...

Select a writeup to read it here.

Browser Tools

Fast utility tools for day-to-day security work.

All tools run locally in your browser. Inputs stay on the page unless you choose to copy or download them.

Password Generator

Generate strong passwords locally, then score entropy and overall strength in the same panel.

CIDR / IP Range Converter

Convert an IPv4 CIDR into its network details, wildcard mask, and usable host range.

Alias Permutations

Generate usernames, handles, and email-style aliases from a name or keyword without leaving the browser.

Hash Generator / Verifier

Hash local text with MD5, SHA-1, SHA-256, and SHA-512, then compare a supplied digest for quick verification.

Encoder / Decoder

Convert between Base64, URL, Hex, and HTML entities with one local workbench.

Mode

JWT Decoder

Decode JWT headers and claims locally, with readable time fields and signature status.

Header


                  

Payload


                  

File Metadata + Hash Inspector

Inspect a local file for size, type, timestamps, and multiple hashes without uploading it anywhere.

TOTP Generator

Generate time-based one-time passwords in-browser from a Base32 secret. The secret stays local.

------

Timestamp Converter

Convert Unix epochs, ISO timestamps, and local date strings into analyst-friendly formats.

Regex Tester

Test patterns, flags, and capture groups against sample text with local preview and match indexing.

Links

My links.

Credential Wall

Credential Wall

Contact

Open to cyber intelligence, research, and security-focused opportunities.