🧰 Security Toolkit

A focused arsenal of browser-based scanners for bug-bounty hunters, red teamers, and defenders. No signup, no install — paste a URL, get answers. All 18 tools share the same one-input, one-click workflow.

Authorized testing only. These tools issue real HTTP requests. Use them against systems you own, or have explicit permission to test. See Terms of Use for the full agreement.
18
Scanners
0
API Keys Required
100%
Browser-Based
FREE
No Account

🌐 Surface & Exposure Mapping

Map what's exposed before someone else does. Discover ports, subdomains, takeover risk, cloud assets.

🔬 Application & Header Audits

Inspect what a target site actually serves — headers, scripts, forms, redirects.

⚡ JS, DOM & Asset Recon

Find vulnerabilities and exposed metadata buried in client-side code.

📦 Repos, Identifiers & Hashes

Audit GitHub repos, decode hashes, look up known indicators.

📚 Related guides

Background reading for the techniques these tools automate.