Virtual TOTP Tokens and converters

The tools below can be used to emulate hardware tokens. This can be used to test the functionality or to verify the OTP generation.


TOTP Toolset

Virtual TOTP Tokens and convertersThis open-source toolset can be used to emulate a hardware token and as to perform OTP verification and drift detection. It can also be used to generate random seeds for programmable tokens and record generated data as CSV file for Azure MFA as described here.
The source code of Token2 TOTP Toolset is available under our GitHub repository. You can also use the hosted version.

t2otp.exe - command-line tool

Virtual TOTP Tokens and convertersThis tool is created as a command-line emulator of Token2 hardware tokens. It can generate any combination of 6 or 8 digits OTP, with 30 or 60 seconds interval, with SHA1 or SHA256 secret keys. Click here for more information and download. - A Simple TOTP Code Generator with Skew Support

If you are a fan of Python (or prefer to view the source code of the tools you are using), here is the Python version of the same tool. This Python script allows you to generate Time-based One-Time Passwords (TOTP) using the PyOTP library. It also provides TOTP codes with a time skew, displaying multiple OTPs around the current time.

This is how the results will appear:

python your_secret_key --num-otp 5
Time: 2023-10-11 15:10:30, TOTP code: 123456
Time: 2023-10-11 15:10:00, TOTP code: 789012
Time: 2023-10-11 15:09:30, TOTP code: 345678
Time: 2023-10-11 15:09:00, TOTP code: 901234
Time: 2023-10-11 15:08:30, TOTP code: 456789


A powershell script to convert files containing TOTP seeds(secrets) from base32 format to hex. The main use case is to convert Azure MFA CSV file to DUO-Compatible TOTP Import file