How to Use SecuTools.io
Learn how to get the most out of our cybersecurity toolkit
Quick Start Guide
Get started in 3 easy steps
Browse Tools
Explore our categorized tools on the homepage. Use the search bar or browse by category to find what you need.
Select a Tool
Click on any tool to open it. Each tool has a clean interface with clear instructions and examples.
Use & Save
Input your data, get instant results, and save your favorites for quick access later.
Key Features
Make the most of SecuTools.io
๐ Smart Search
Use the search bar on the homepage to quickly find tools. Press โK (Mac) or Ctrl+K (Windows) to focus the search instantly.
Tip: Search by tool name, description, or category for best results.
โญ Favorites
Click the star icon on any tool to add it to your favorites. Your favorites are saved locally and appear at the top of the homepage for quick access.
Tip: Favorite your most-used tools to create a personalized dashboard.
โก Recent Tools
Your recently used tools are automatically tracked and displayed below the search bar for easy re-access.
Tip: Recent tools are stored locally in your browser.
๐ Categories
Tools are organized into 6 main categories. Click "Collapse" or "Expand" on any category to show/hide its tools.
- Cryptography & Encoding: Hash tools, JWT, passwords, certificates
- Threat Intelligence: IOC extraction, CVE lookup, WHOIS, threat checks
- Web & Cloud Security: Headers check, CORS, CSRF, security scanning
- Penetration Testing: Wordlists, payloads, fuzzing tools
- AI Security: Prompt engineering, jailbreak testing, RAG builders
- Learning: Tips, tutorials, educational resources
Popular Tools Guide
How to use our most popular tools
๐ Hash Tools
- Navigate to the Hash Tools page
- Enter your text or upload a file
- Select the hash algorithm (MD5, SHA1, SHA256, SHA512)
- View the generated hash instantly
- Copy the result with one click
๐ซ JWT Decoder
- Paste your JWT token into the input field
- The tool automatically decodes the header and payload
- View claims, expiration time, and signature details
- Verify token validity and structure
๐ IOC Extractor
- Paste text containing potential indicators of compromise
- The tool automatically extracts IPs, URLs, hashes, and emails
- Review the categorized results
- Export or copy the extracted IOCs
๐ก๏ธ Security Headers Checker
- Enter the URL you want to check
- Click "Check Headers"
- Review the security headers analysis
- Get recommendations for missing or misconfigured headers
๐ค Jailbreak Tester
- Enter your AI prompt or system message
- Select from common jailbreak attack patterns
- Test how well your prompt resists manipulation
- Review security recommendations and improvements
Privacy & Security
Your data stays private
๐ Client-Side Processing
Most tools process data entirely in your browser. Your sensitive information never leaves your device.
๐ API-Based Tools
Some tools (like CVE Lookup, WHOIS, Threat Intel) require external API calls. These are clearly marked with an "api" tag.
๐พ Local Storage
Favorites and recent tools are stored in your browser's local storage. No account or sign-up required.
Tips & Tricks
Pro tips for power users
๐ก Keyboard Shortcuts
- โข โK / Ctrl+K - Focus search
- โข Esc - Clear search
๐ฏ Filter by Tags
Use tag filters in the sidebar to find tools by type: client-only, api, upload, vuln, etc.
๐ Dark Mode
Toggle dark mode using the button in the top-right corner for comfortable viewing.
๐ฑ Mobile Friendly
All tools are fully responsive and work great on mobile devices.