Interactive cybersecurity tools — 17 widgets across 5 domains. All client-side, no data leaves your browser.
Designed & built by Mohammed AlYahya
Click a preset or type a command to start scanning...
Try injecting HTML/JS into the search box below. The left panel shows vulnerable output, the right shows sanitized output.
The flag is hidden in the page source. Can you find it?
Paste email headers below to analyze for phishing indicators.
> Enter a CVE ID or click a famous vulnerability above
> Waiting for input...
Select an asset type to generate a STRIDE threat model with recommended mitigations.
> Select an asset type above to begin threat modeling.
> Enter text above to see hashes and encodings