Convert between PKCS#1 and PKCS#8 without guessing flags
Upload a PEM private key, pick the direction, and let the platform call openssl with strict/best-practice defaults so you always get a clean AES-256 protected artifact (or an intentionally unencrypted file when compatibility demands it).
Upload & configure
Conversion guardrails
CLI fidelity. The tool shells out to the host openssl binary so the behavior matches what you would run locally.
Passphrase hygiene. Secrets only live in memory during the request and memory is scrubbed before the workspace is destroyed.
Strict vs. best effort. Strict mode fails fast on multiple private key blocks while the default gently warns and proceeds with the first.
Transparent warnings. Verbose mode surfaces the direction executed, warnings about unencrypted output, and anything openssl prints.