Security Audit & Vulnerability Tools

Security auditing tools for port scanning, subdomain enumeration, vulnerability search, WAF detection, DNS security testing, and cryptographic utilities. Built for penetration testers, security analysts, and DevSecOps teams.

IP Reputation Checker

Check IP reputation

Check the reputation of an IP address across multiple threat intelligence databases. Detect malicious IPs, spam sources, and known attack origins.

Domain Reputation

Check domain reputation

Evaluate a domain's reputation across DNS blacklists, mail infrastructure, and security configurations. Identify domains used for phishing, spam, or malware distribution.

Open Port Audit

Audit open ports

Scan common ports on a target host to identify open services. Detect unnecessary exposed ports that could be security risks.

Subdomain Finder

Enumerate subdomains

Discover subdomains using Certificate Transparency logs. Find hidden subdomains, staging environments, and forgotten infrastructure.

Subdomain Takeover

Detect subdomain takeover

Detect subdomain takeover vulnerabilities by checking for dangling DNS records pointing to unclaimed cloud services.

DNS Rebinding Checker

Detect DNS rebinding

Test domains for DNS rebinding vulnerabilities where DNS responses alternate between public and private IPs to bypass same-origin policies.

GraphQL Scanner

Scan GraphQL endpoints

Scan GraphQL endpoints for security misconfigurations including introspection exposure, query depth limits, and schema information leakage.

Request Smuggling Detector

Detect HTTP request smuggling

Detect HTTP request smuggling vulnerabilities caused by differences in how front-end and back-end servers parse HTTP requests.

Cloud Storage Checker

Check cloud storage exposure

Check S3 buckets, GCS buckets, and Azure Blob containers for public access misconfigurations. Detect exposed cloud storage resources.

CVE Search

Search CVE database

Search the CVE (Common Vulnerabilities and Exposures) database for known security vulnerabilities. Find CVEs by keyword, product, or vendor.

Default Password Lookup

Search default passwords

Look up default credentials for network devices, routers, switches, and IoT devices. Essential for security auditing and initial device setup verification.

Password Generator

Free

Generate secure passwords

Generate cryptographically secure random passwords with configurable length, character sets, and complexity requirements.

Password Strength

Free

Evaluate password strength

Evaluate password strength using entropy analysis and pattern detection. Get recommendations for improving password security.

Hash Generator

Free

Generate MD5/SHA hashes

Generate cryptographic hashes using MD5, SHA-1, SHA-256, SHA-384, and SHA-512 algorithms. Compare file integrity and verify checksums.

HMAC Generator

Free

Generate HMAC authentication codes

Generate Hash-based Message Authentication Codes (HMAC) for API authentication, webhook verification, and message integrity checking.

JWT Decoder

Free

Decode and inspect JWT tokens

Decode JSON Web Tokens to inspect header, payload, and signature. View claims, expiration times, and token structure without external tools.

CORS Tester

Test CORS policy configuration

Test Cross-Origin Resource Sharing (CORS) policy configuration. Verify allowed origins, methods, headers, and credentials settings.

SSL Chain Validator

Validate SSL certificate chain

Validate the complete SSL certificate chain from leaf to root. Detect missing intermediate certificates and chain ordering issues.

Redirect Checker

Trace HTTP redirect chain

Trace the complete HTTP redirect chain for any URL. Identify redirect loops, unnecessary redirects, and HTTP-to-HTTPS upgrade paths.

WAF Detector

Detect web application firewalls

Detect the presence and type of Web Application Firewalls (WAF) protecting a website. Identify vendors like Cloudflare, AWS WAF, Akamai, and others.

Tech Stack Detector

Detect website tech stack

Detect the technology stack used by a website including web server, CMS, JavaScript frameworks, analytics tools, and CDN providers.

API Discovery

Discover API endpoints

Discover API endpoints by checking common paths like /api, /graphql, /swagger, and well-known configuration files. Map the API attack surface.

Zone Transfer Test

Test DNS AXFR zone transfer

Test if DNS servers allow unauthorized zone transfers (AXFR). Zone transfer misconfigurations can expose the complete list of DNS records for a domain.

DNS Takeover Checker

Detect DNS takeover risks

Detect DNS takeover vulnerabilities by checking for orphaned DNS records pointing to decommissioned services or expired cloud resources.

Download Now

Requires iOS 16.0 or later. Free to download.