How to Use SecuTools.io

Learn how to get the most out of our cybersecurity toolkit

Quick Start Guide

Get started in 3 easy steps

1

Browse Tools

Explore our categorized tools on the homepage. Use the search bar or browse by category to find what you need.

2

Select a Tool

Click on any tool to open it. Each tool has a clean interface with clear instructions and examples.

3

Use & Save

Input your data, get instant results, and save your favorites for quick access later.

Key Features

Make the most of SecuTools.io

๐Ÿ” Smart Search

Use the search bar on the homepage to quickly find tools. Press โŒ˜K (Mac) or Ctrl+K (Windows) to focus the search instantly.

Tip: Search by tool name, description, or category for best results.

โญ Favorites

Click the star icon on any tool to add it to your favorites. Your favorites are saved locally and appear at the top of the homepage for quick access.

Tip: Favorite your most-used tools to create a personalized dashboard.

โšก Recent Tools

Your recently used tools are automatically tracked and displayed below the search bar for easy re-access.

Tip: Recent tools are stored locally in your browser.

๐Ÿ“š Categories

Tools are organized into 6 main categories. Click "Collapse" or "Expand" on any category to show/hide its tools.

  • Cryptography & Encoding: Hash tools, JWT, passwords, certificates
  • Threat Intelligence: IOC extraction, CVE lookup, WHOIS, threat checks
  • Web & Cloud Security: Headers check, CORS, CSRF, security scanning
  • Penetration Testing: Wordlists, payloads, fuzzing tools
  • AI Security: Prompt engineering, jailbreak testing, RAG builders
  • Learning: Tips, tutorials, educational resources

Popular Tools Guide

How to use our most popular tools

๐Ÿ” Hash Tools

  1. Navigate to the Hash Tools page
  2. Enter your text or upload a file
  3. Select the hash algorithm (MD5, SHA1, SHA256, SHA512)
  4. View the generated hash instantly
  5. Copy the result with one click

๐ŸŽซ JWT Decoder

  1. Paste your JWT token into the input field
  2. The tool automatically decodes the header and payload
  3. View claims, expiration time, and signature details
  4. Verify token validity and structure

๐Ÿ” IOC Extractor

  1. Paste text containing potential indicators of compromise
  2. The tool automatically extracts IPs, URLs, hashes, and emails
  3. Review the categorized results
  4. Export or copy the extracted IOCs

๐Ÿ›ก๏ธ Security Headers Checker

  1. Enter the URL you want to check
  2. Click "Check Headers"
  3. Review the security headers analysis
  4. Get recommendations for missing or misconfigured headers

๐Ÿค– Jailbreak Tester

  1. Enter your AI prompt or system message
  2. Select from common jailbreak attack patterns
  3. Test how well your prompt resists manipulation
  4. Review security recommendations and improvements

Privacy & Security

Your data stays private

๐Ÿ”’ Client-Side Processing

Most tools process data entirely in your browser. Your sensitive information never leaves your device.

๐ŸŒ API-Based Tools

Some tools (like CVE Lookup, WHOIS, Threat Intel) require external API calls. These are clearly marked with an "api" tag.

๐Ÿ’พ Local Storage

Favorites and recent tools are stored in your browser's local storage. No account or sign-up required.

Tips & Tricks

Pro tips for power users

๐Ÿ’ก Keyboard Shortcuts

  • โ€ข โŒ˜K / Ctrl+K - Focus search
  • โ€ข Esc - Clear search

๐ŸŽฏ Filter by Tags

Use tag filters in the sidebar to find tools by type: client-only, api, upload, vuln, etc.

๐ŸŒ™ Dark Mode

Toggle dark mode using the button in the top-right corner for comfortable viewing.

๐Ÿ“ฑ Mobile Friendly

All tools are fully responsive and work great on mobile devices.

Need More Help?

Can't find what you're looking for? We're here to help!