Unicode Security Analyzer
Unicode Security Analyzer is a comprehensive suite of utilities designed to help users detect and analyze invisible characters in text, emails, and URLs. Invisible characters can be used for various purposes including steganography, fingerprinting AI-generated content, phishing attacks, and security exploits. Each tool is built with modern best practices and follows AWS Cloudscape design patterns for a consistent user experience. Select a tool below to begin.
Launch Unicode Security Analyzer
100% Data Privacy
- No data transmission to external servers
- All processing performed exclusively on your device
🛡️ I built this tool purely for fun and out of my passion for IT security – free to use and available to everyone.
If you find it useful and would like to support my work, a coffee is always welcome:
Features
The Unicode Security Analyzer includes the following tools
Invisible Character Legend
Browse and reference all invisible characters, control characters, and special Unicode characters. Includes Unicode codes, names, and categories for educational and reference purposes.
Check Text on Invisible Characters
Detect, analyze, and remove hidden characters from text. Identify security risks like homoglyphs, zero-width characters, and steganography patterns. Also useful for identifying fingerprints from GenAI outputs (e.g., ChatGPT, Claude, etc.).
Check Email EML-File on Invisible Characters
Upload and comprehensively analyze email files in EML format. Includes header analysis, authentication checks, and invisible character detection.
Check URL on Invisible Characters
Detect and analyze invisible characters hidden in URLs. Identifies zero-width characters, directional marks, and other hidden Unicode that can be used to disguise malicious links or bypass security filters.
M365 Safe Link Decoder
Decode Microsoft 365 Safe Links URLs to reveal the original destination. Supports batch processing and provides detailed URL analysis.
Mail Header Analysis
Analyze email headers to trace delivery paths, verify authentication (SPF/DKIM/DMARC), and identify potential security issues.