Security Audit & Vulnerability Tools
Security auditing tools for port scanning, subdomain enumeration, vulnerability search, WAF detection, DNS security testing, and cryptographic utilities. Built for penetration testers, security analysts, and DevSecOps teams.
IP Reputation Checker
Check IP reputation
Check the reputation of an IP address across multiple threat intelligence databases. Detect malicious IPs, spam sources, and known attack origins.
Domain Reputation
Check domain reputation
Evaluate a domain's reputation across DNS blacklists, mail infrastructure, and security configurations. Identify domains used for phishing, spam, or malware distribution.
Open Port Audit
Audit open ports
Scan common ports on a target host to identify open services. Detect unnecessary exposed ports that could be security risks.
Subdomain Finder
Enumerate subdomains
Discover subdomains using Certificate Transparency logs. Find hidden subdomains, staging environments, and forgotten infrastructure.
Subdomain Takeover
Detect subdomain takeover
Detect subdomain takeover vulnerabilities by checking for dangling DNS records pointing to unclaimed cloud services.
DNS Rebinding Checker
Detect DNS rebinding
Test domains for DNS rebinding vulnerabilities where DNS responses alternate between public and private IPs to bypass same-origin policies.
GraphQL Scanner
Scan GraphQL endpoints
Scan GraphQL endpoints for security misconfigurations including introspection exposure, query depth limits, and schema information leakage.
Request Smuggling Detector
Detect HTTP request smuggling
Detect HTTP request smuggling vulnerabilities caused by differences in how front-end and back-end servers parse HTTP requests.
Cloud Storage Checker
Check cloud storage exposure
Check S3 buckets, GCS buckets, and Azure Blob containers for public access misconfigurations. Detect exposed cloud storage resources.
CVE Search
Search CVE database
Search the CVE (Common Vulnerabilities and Exposures) database for known security vulnerabilities. Find CVEs by keyword, product, or vendor.
Default Password Lookup
Search default passwords
Look up default credentials for network devices, routers, switches, and IoT devices. Essential for security auditing and initial device setup verification.
Password Generator
FreeGenerate secure passwords
Generate cryptographically secure random passwords with configurable length, character sets, and complexity requirements.
Password Strength
FreeEvaluate password strength
Evaluate password strength using entropy analysis and pattern detection. Get recommendations for improving password security.
Hash Generator
FreeGenerate MD5/SHA hashes
Generate cryptographic hashes using MD5, SHA-1, SHA-256, SHA-384, and SHA-512 algorithms. Compare file integrity and verify checksums.
HMAC Generator
FreeGenerate HMAC authentication codes
Generate Hash-based Message Authentication Codes (HMAC) for API authentication, webhook verification, and message integrity checking.
JWT Decoder
FreeDecode and inspect JWT tokens
Decode JSON Web Tokens to inspect header, payload, and signature. View claims, expiration times, and token structure without external tools.
CORS Tester
Test CORS policy configuration
Test Cross-Origin Resource Sharing (CORS) policy configuration. Verify allowed origins, methods, headers, and credentials settings.
SSL Chain Validator
Validate SSL certificate chain
Validate the complete SSL certificate chain from leaf to root. Detect missing intermediate certificates and chain ordering issues.
Redirect Checker
Trace HTTP redirect chain
Trace the complete HTTP redirect chain for any URL. Identify redirect loops, unnecessary redirects, and HTTP-to-HTTPS upgrade paths.
WAF Detector
Detect web application firewalls
Detect the presence and type of Web Application Firewalls (WAF) protecting a website. Identify vendors like Cloudflare, AWS WAF, Akamai, and others.
Tech Stack Detector
Detect website tech stack
Detect the technology stack used by a website including web server, CMS, JavaScript frameworks, analytics tools, and CDN providers.
API Discovery
Discover API endpoints
Discover API endpoints by checking common paths like /api, /graphql, /swagger, and well-known configuration files. Map the API attack surface.
Zone Transfer Test
Test DNS AXFR zone transfer
Test if DNS servers allow unauthorized zone transfers (AXFR). Zone transfer misconfigurations can expose the complete list of DNS records for a domain.
DNS Takeover Checker
Detect DNS takeover risks
Detect DNS takeover vulnerabilities by checking for orphaned DNS records pointing to decommissioned services or expired cloud resources.
Download Now
Requires iOS 16.0 or later. Free to download.