Browse 15 Cybersecurity Tools
Security analysis, port scanning, threat detection, blacklist checking, and security monitoring utilities.
Statistics
Filters
Category
Showing 15 of 15 tools
Abuse Detector
Detect application abuse through abnormal request patterns and scraping attempts. Analyze user behavior.
Audit Logger
Collect and analyze security audit logs. Track authentication events and security incidents for compliance.
Brute-Force Blocker
Detect and block brute-force login attacks with rate limiting and IP blocking. Protect against credential stuffing.
CSP Validator
Validate Content Security Policy headers to prevent XSS and clickjacking. Test CSP directives and identify misconfigurations.
DDoS Detector
Detect and analyze DDoS attacks with real-time traffic monitoring. Identify volumetric attacks, SYN floods, and HTTP floods.
Exfiltration Monitor
Monitor for data exfiltration attempts and unauthorized data transfers. Essential for data loss prevention (DLP).
Honeypot Endpoint
Create decoy endpoints to detect automated attacks and bots. Configure honeypot responses and alerts.
JWT Validator
Decode and validate JWT tokens. Verify signatures, check expiration, and inspect claims for security issues.
MFA Middleware
Generate and validate TOTP codes for multi-factor authentication. Test 2FA/MFA implementations.
Password Strength Validator
Test password strength with entropy calculation, dictionary attacks, and NIST guidelines. Get real-time security feedback.
Port Scanner
Scan TCP ports to identify open services and assess network security with our free port scanner tool. Essential for security audits and penetration testing.
Rate Limiter
Configure and test rate limiting policies for APIs. Prevent abuse and control traffic with sliding window and token bucket algorithms.
Token Honeypot
Deploy honeypot tokens to detect theft attempts and session hijacking. Monitor for unauthorized access.
Traffic Anomaly Detector
Detect abnormal network traffic patterns and identify security threats with statistical analysis and behavioral detection.
Web Application Firewall
Configure WAF rules for SQL injection, XSS, CSRF protection. Test security policies and filter malicious traffic.
