🛡

Security

SSL 检查、密码熵、XSS/SQL 注入参考、CSP 生成等安全工具

30 tools
🔒

SSL Certificate Checker

Check SSL certificate status & expiry
🧮

Password Entropy Calculator

Calculate password entropy & strength
🛡

XSS Reference

XSS payloads and defense reference
🗃

SQL Injection Reference

SQL injection testing & defense guide
🛡

CSP Policy Generator

Generate Content Security Policy
🔑

OAuth 2.0 Builder

Build OAuth 2.0 auth request params
🔍

Sensitive Info Detector

Detect secrets & passwords in text NEW
🔒

Hash Algorithm Reference

Hash algorithm security reference
🔐

SSL/TLS Reference

SSL/TLS versions & cipher suites ref
🎫

JWT Best Practices

JWT security guide & common errors
🌐

CORS Security Guide

CORS cross-origin security practices

Rate Limiting Patterns

Token bucket, sliding window algos
🔍

Dependency Audit Reference

npm/pip/go dependency audit commands
🔑

Secret Scanning Patterns

API key format regex patterns
🛡

OWASP Top 10 Reference

OWASP Top 10 vulnerability guide
🛡

OWASP Top 10 Guide

2021 OWASP Top 10 risks explained
🔐

Secure Coding Guide

Input validation & parameterized queries
🔓

Pentest Basics

Authorized penetration testing guide
🔑

Cryptography Basics

Symmetric/asymmetric crypto & hashing
🏰

Zero Trust Guide

Zero trust security architecture
🚨

Incident Response Guide

Security incident response playbook
🔍

Vulnerability Management

CVE/CVSS scoring & patch workflow
🎯

Threat Modeling Guide

STRIDE threat analysis methodology

Cloud Security Guide

IAM & network cloud security tips
🔗

Supply Chain Security

SBOM & dependency risk mitigation
🔏

GDPR Compliance Checklist

EU data protection compliance guide
📋

Privacy Policy Guide

Privacy policy required clauses
🔒

SSL/TLS Config Guide

TLS 1.3 certificate security config
🛡

HTTP Security Headers

CSP/HSTS/X-Frame security headers
🔍

Dependency Audit Guide

npm audit/Snyk vuln scanning