8 focused cybersecurity tools for professionals
Showing 8 tools
Analyze security headers of any website and identify misconfigurations and vulnerabilities
Decode and inspect JSON Web Tokens — header, payload, claims and expiration
Identify hash algorithms by pattern — MD5, SHA-1, NTLM, bcrypt, sha512crypt and more
Detect SQL injection, XSS, brute force, scanners and sensitive file access in server logs
Generate cryptographic hashes (MD5, SHA-1, SHA-256, SHA-512) with security context
Calculate network ranges, subnet masks, CIDR notation and available hosts
4 tools
Analyze security headers of any website and identify misconfigurations and vulnerabilities
Decode and inspect JSON Web Tokens — header, payload, claims and expiration
Identify hash algorithms by pattern — MD5, SHA-1, NTLM, bcrypt, sha512crypt and more
Detect SQL injection, XSS, brute force, scanners and sensitive file access in server logs
2 tools