Category Filter Active

Browse 15 Cybersecurity Tools

Security analysis, port scanning, threat detection, blacklist checking, and security monitoring utilities.

Statistics

Total Tools:325
Matching:15
Categories:15

Filters

Category

Showing 15 of 15 tools

Abuse Detector

CybersecurityBeginner

Detect application abuse through abnormal request patterns and scraping attempts. Analyze user behavior.

Audit Logger

CybersecurityBeginner

Collect and analyze security audit logs. Track authentication events and security incidents for compliance.

Brute-Force Blocker

CybersecurityIntermediate

Detect and block brute-force login attacks with rate limiting and IP blocking. Protect against credential stuffing.

CSP Validator

CybersecurityBeginner

Validate Content Security Policy headers to prevent XSS and clickjacking. Test CSP directives and identify misconfigurations.

DDoS Detector

CybersecurityAdvanced

Detect and analyze DDoS attacks with real-time traffic monitoring. Identify volumetric attacks, SYN floods, and HTTP floods.

Exfiltration Monitor

CybersecurityAdvanced

Monitor for data exfiltration attempts and unauthorized data transfers. Essential for data loss prevention (DLP).

Honeypot Endpoint

CybersecurityBeginner

Create decoy endpoints to detect automated attacks and bots. Configure honeypot responses and alerts.

JWT Validator

CybersecurityBeginner

Decode and validate JWT tokens. Verify signatures, check expiration, and inspect claims for security issues.

MFA Middleware

CybersecurityBeginner

Generate and validate TOTP codes for multi-factor authentication. Test 2FA/MFA implementations.

Password Strength Validator

CybersecurityBeginner

Test password strength with entropy calculation, dictionary attacks, and NIST guidelines. Get real-time security feedback.

Port Scanner

CybersecurityIntermediate

Scan TCP ports to identify open services and assess network security with our free port scanner tool. Essential for security audits and penetration testing.

Rate Limiter

CybersecurityBeginner

Configure and test rate limiting policies for APIs. Prevent abuse and control traffic with sliding window and token bucket algorithms.

Token Honeypot

CybersecurityBeginner

Deploy honeypot tokens to detect theft attempts and session hijacking. Monitor for unauthorized access.

Traffic Anomaly Detector

CybersecurityBeginner

Detect abnormal network traffic patterns and identify security threats with statistical analysis and behavioral detection.

Web Application Firewall

CybersecurityBeginner

Configure WAF rules for SQL injection, XSS, CSRF protection. Test security policies and filter malicious traffic.