Security Tools & Pentesting Utilities

A complete Arsenal of 24+ tools for reconnaissance, vulnerability analysis, code security, and threat simulation. Browser-based utilities and Python frameworks for security researchers, pentesters, and defenders.

Complete Recon
Subdomain enumeration, OSINT, tech detection, and reconnaissance tools
Vulnerability Analysis
CVE lookup, OWASP guides, payload generators, and security testing
Real-time Simulation
Purple team scenarios, incident response, and attack simulations
Zero Setup
Browser-based tools work instantly, no installation required

All Tools

25 browser-based security tools and Python CLI utilities — covering recon, web security, cryptography, and a full security lab with Python dashboards. Built for researchers, pentesters, and defenders.

25 total tools
14 browser tools
11 Python CLI + dashboard
5 categories
Reconnaissance & Threat Discovery

WHOIS & IP Lookup

Domain WHOIS lookup and IP geolocation in one tool. Returns registrar info, name servers, ASN, abuse contacts, and geographic data.

includes: WHOIS lookup, IP geolocation, ASN resolution, DNS records, abuse contact lookup

whois ip-lookup osint recon

Metadata Inspector

Drag-and-drop EXIF and metadata extractor. Reads embedded GPS coordinates, camera model, software stamps, and authorship data from images and documents.

includes: EXIF extraction, GPS coordinate reveal, camera model, software stamp, timestamps — browser-side only

exif metadata privacy osint

JSIntelliHawk

JavaScript file analyzer for bug bounty recon. Extracts hidden endpoints, API keys, hardcoded credentials, and secrets from client-side JS files.

includes: Endpoint extraction, API key regex, secret detection, source map analysis, inline credential scanner

javascript recon bug-bounty web-security

Network Recon & Attack Surface Mapper

TCP connect scanner with banner grabbing, subdomain enumeration against a 20-entry wordlist, OS fingerprinting, and high-risk port flagging. Generates JSON and HTML risk reports.

includes: ThreadPoolExecutor scanner, 31-entry service map, subdomain brute-force, JSON + HTML report generator — Python CLI + dashboard

recon port-scan network Python
web security

Payload Encoder / Decoder

Multi-format payload encoder and decoder. Base64, URL, HTML entities, Hex, and Unicode escape — all in one offline-ready utility.

includes: Base64, URL, HTML entity, Hex, Unicode escape — bidirectional, offline, client-side

encoding decoding payloads web-security

JWT Analyzer

Decode, inspect, and analyze JSON Web Tokens. Flags algorithm misconfigurations, weak signing secrets, expiry issues, and common authentication bypass vectors.

includes: JWT decode, algorithm check (alg:none), expiry analysis, claim inspector, vulnerability flag list

jwt auth tokens web-security

XSS Payload Generator

Context-aware XSS payload library organized by injection context. Covers HTML, attribute, JavaScript, and URL contexts with WAF bypass and polyglot variants.

includes: Basic, HTML, attribute, JS-context, URL, bypass, event-handler, and polyglot payloads

xss payloads bug-bounty web-security

Cookie Analyzer

Parse and audit HTTP cookies for security misconfigurations. Flags missing Secure, HttpOnly, and SameSite attributes with severity ratings.

includes: Cookie parser, Secure/HttpOnly/SameSite flag checker, domain scope analysis, expiry inspection

cookies http auth web-security

CSP Analyzer

Content Security Policy analyzer and visualizer. Parses policy strings, identifies weak directives like unsafe-inline and unsafe-eval, and surfaces bypass vectors.

includes: CSP parser, directive breakdown, unsafe-inline/eval detection, wildcard source flagging, bypass vector list

csp headers hardening web-security
cryptography

Hash Generator

Generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes from text or dropped files. Also identifies unknown hash types by length and format pattern.

includes: MD5/SHA-1/SHA-256/SHA-384/SHA-512, file hashing via FileReader, hash type identifier

hashing sha256 md5 integrity

AES Encrypt / Decrypt

Browser-side AES encryption and decryption via the SubtleCrypto API. Supports CBC and GCM modes with configurable key sizes and automatic IV management.

includes: AES-128/192/256, CBC and GCM modes, SubtleCrypto API, key generation, IV management — no data leaves the browser

aes encryption cryptography privacy

Cipher Tools

Classic and historical cipher suite with a tabbed interface. ROT13, Caesar, Vigenère, Atbash, and Morse Code — encode and decode fully client-side.

includes: ROT13, Caesar cipher (configurable shift), Vigenère, Atbash, Morse Code — bidirectional

ciphers cryptography encoding morse

Password Strength Checker

Password entropy analyzer with offline crack-time estimation. Scores character class diversity, detects common patterns, and estimates offline attack cost — no data leaves the browser.

includes: Entropy bits, character class scoring, common pattern detection, offline crack-time estimate

passwords entropy security client-side
utilities

Security Workflow Reference

Structured web application security testing workflow reference. Documents methodology phases from recon through exploitation and reporting.

includes: Recon phase checklist, scanning methodology, exploitation reference, reporting templates

workflow methodology reference web-security

File Sharing Server

Secure local-network file sharing with a browser UI, token-based access, upload/download support, and admin controls for isolated shares.

includes: Tokenized share URLs, drag-and-drop uploads, per-share limits, activity logging, path traversal protections

file-sharing self-hosted Python web-ui