{"id":1237,"date":"2024-04-20T14:38:58","date_gmt":"2024-04-20T14:38:58","guid":{"rendered":"https:\/\/hacking.cool\/?page_id=1237"},"modified":"2024-04-20T15:06:42","modified_gmt":"2024-04-20T15:06:42","slug":"tools","status":"publish","type":"page","link":"https:\/\/hacking.cool\/atomanya\/tools\/","title":{"rendered":"Tools"},"content":{"rendered":"\n<p>Welcome, digital adventurers, to my arcane workshop. Behold my collection of mystical cyber tools, forged in the fires of code and curiosity. Gear up for your next quest!<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/04\/hacking.cool_.tools32-1024x585.gif\" alt=\"\" class=\"wp-image-1245\" style=\"aspect-ratio:1.7504273504273504;width:620px;height:auto\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/04\/hacking.cool_.tools32-1024x585.gif 1024w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/04\/hacking.cool_.tools32-300x171.gif 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/04\/hacking.cool_.tools32-768x439.gif 768w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/04\/hacking.cool_.tools32-1536x878.gif 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p><strong>NetGazer<\/strong>: Web Server Screenshot Capturer. NetGazer is designed to efficiently capture screenshots of websites and web servers based on a predefined list of IP addresses and URLs. It then meticulously organizes and presents these results in a Word document table.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/5u5urrus\/NetGazer\">https:\/\/github.com\/5u5urrus\/NetGazer<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Sanitizer<\/strong>: Network Address Cleanup Tool. A nice simple tool designed to take different address inputs, efficiently converting mixed formats like CIDR, IP ranges, and domain URLs into a uniform list of IP addresses and domains. Perfect for streamlining network setup and security analysis tasks.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/5u5urrus\/Sanitizer\">https:\/\/github.com\/5u5urrus\/Sanitizer<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>WebScout<\/strong>: Web Server Discovery Tool. WebScout is an efficient tool designed for scanning and identifying live web servers across networks. It offers configurable options to tailor scans to specific network environments and needs. Can be nicely chained with the Sanitizer. <\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/5u5urrus\/WebScout\">https:\/\/github.com\/5u5urrus\/WebScout<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>PassPatternLab: Password Analysis Toolkit<\/strong>. A dedicated research repository consisting of a number of tools I designed for uncovering the intricate world of password patterns and user behavior in creating passwords:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The Character Frequency Analysis Tool<\/strong><\/li>\n\n\n\n<li><strong>The Positional Character Analysis Tool<\/strong><\/li>\n\n\n\n<li><strong>The Detailed Positional Character Analysis Tool<\/strong><\/li>\n\n\n\n<li><strong>The Enhanced Password Composition Analysis Tool<\/strong><\/li>\n\n\n\n<li><strong>The Sequential Character Analysis Tool<\/strong><\/li>\n\n\n\n<li><strong>The Positional Character Succession Analysis Tool<\/strong><\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/github.com\/5u5urrus\/PassPatternLab\">https:\/\/github.com\/5u5urrus\/PassPatternLab<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>PortLens<\/strong>: Your Cyber Lens for the Ports. PortLens provides detailed insights into any port. This tool presents port-related data such as services, threats, and detailed specifics associated with any port number you submit to it.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/5u5urrus\/PortLens\">https:\/\/github.com\/5u5urrus\/PortLens<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>HeaderScope<\/strong>: Security Header Inspector. Precisely analyzes and reports on the security configurations of HTTP headers, checking for adherence to best practices and pinpointing common security oversights to bolster your website&#8217;s defenses.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/5u5urrus\/HeaderScope\">https:\/\/github.com\/5u5urrus\/HeaderScope<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>PathFinder<\/strong>: Cyber Realm Navigator. This simple &amp; agile web-spidering tool dives deep into the web, navigating through layers of URLs to uncover hidden links and forge paths previously untrodden.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/5u5urrus\/PathFinder\">https:\/\/github.com\/5u5urrus\/PathFinder<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome, digital adventurers, to my arcane workshop. Behold my collection of mystical cyber tools, forged in the fires of code and curiosity. Gear up for your next quest! NetGazer: Web Server Screenshot Capturer. NetGazer is designed to efficiently capture screenshots of websites and web servers based on a predefined list of IP addresses and URLs.<span class=\"post-excerpt-end\">&hellip;<\/span><\/p>\n<p class=\"more-link\"><a href=\"https:\/\/hacking.cool\/atomanya\/tools\/\" class=\"themebutton\">Read More<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_mi_skip_tracking":false,"footnotes":""},"class_list":["post-1237","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tools - hacking.cool<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hacking.cool\/atomanya\/tools\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tools - hacking.cool\" \/>\n<meta property=\"og:description\" content=\"Welcome, digital adventurers, to my arcane workshop. Behold my collection of mystical cyber tools, forged in the fires of code and curiosity. Gear up for your next quest! NetGazer: Web Server Screenshot Capturer. NetGazer is designed to efficiently capture screenshots of websites and web servers based on a predefined list of IP addresses and URLs.&hellip;Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hacking.cool\/atomanya\/tools\/\" \/>\n<meta property=\"og:site_name\" content=\"hacking.cool\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-20T15:06:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/04\/hacking.cool_.tools32-1024x585.gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/#website\",\"url\":\"https:\/\/hacking.cool\/atomanya\/\",\"name\":\"hacking.cool\",\"description\":\"is the hacking school \ud83d\udc69\ud83c\udffb\u200d\ud83d\udcbb\ud83e\uddd1\ud83c\udffb\u200d\ud83d\udcbb\ud83d\uddfa\ud83d\udcda\ud83d\udcd6\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hacking.cool\/atomanya\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/tools\/#primaryimage\",\"url\":\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/04\/hacking.cool_.tools32.gif\",\"contentUrl\":\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/04\/hacking.cool_.tools32.gif\",\"width\":1792,\"height\":1024},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/tools\/\",\"url\":\"https:\/\/hacking.cool\/atomanya\/tools\/\",\"name\":\"Tools - hacking.cool\",\"isPartOf\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/tools\/#primaryimage\"},\"datePublished\":\"2024-04-20T14:38:58+00:00\",\"dateModified\":\"2024-04-20T15:06:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/tools\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hacking.cool\/atomanya\/tools\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/tools\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hacking.cool\/atomanya\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tools\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tools - hacking.cool","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hacking.cool\/atomanya\/tools\/","og_locale":"en_US","og_type":"article","og_title":"Tools - hacking.cool","og_description":"Welcome, digital adventurers, to my arcane workshop. Behold my collection of mystical cyber tools, forged in the fires of code and curiosity. Gear up for your next quest! NetGazer: Web Server Screenshot Capturer. NetGazer is designed to efficiently capture screenshots of websites and web servers based on a predefined list of IP addresses and URLs.&hellip;Read More","og_url":"https:\/\/hacking.cool\/atomanya\/tools\/","og_site_name":"hacking.cool","article_modified_time":"2024-04-20T15:06:42+00:00","og_image":[{"url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/04\/hacking.cool_.tools32-1024x585.gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/hacking.cool\/atomanya\/#website","url":"https:\/\/hacking.cool\/atomanya\/","name":"hacking.cool","description":"is the hacking school \ud83d\udc69\ud83c\udffb\u200d\ud83d\udcbb\ud83e\uddd1\ud83c\udffb\u200d\ud83d\udcbb\ud83d\uddfa\ud83d\udcda\ud83d\udcd6","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hacking.cool\/atomanya\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hacking.cool\/atomanya\/tools\/#primaryimage","url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/04\/hacking.cool_.tools32.gif","contentUrl":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2024\/04\/hacking.cool_.tools32.gif","width":1792,"height":1024},{"@type":"WebPage","@id":"https:\/\/hacking.cool\/atomanya\/tools\/","url":"https:\/\/hacking.cool\/atomanya\/tools\/","name":"Tools - hacking.cool","isPartOf":{"@id":"https:\/\/hacking.cool\/atomanya\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hacking.cool\/atomanya\/tools\/#primaryimage"},"datePublished":"2024-04-20T14:38:58+00:00","dateModified":"2024-04-20T15:06:42+00:00","breadcrumb":{"@id":"https:\/\/hacking.cool\/atomanya\/tools\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hacking.cool\/atomanya\/tools\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/hacking.cool\/atomanya\/tools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hacking.cool\/atomanya\/"},{"@type":"ListItem","position":2,"name":"Tools"}]}]}},"_links":{"self":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/pages\/1237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/comments?post=1237"}],"version-history":[{"count":18,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/pages\/1237\/revisions"}],"predecessor-version":[{"id":1261,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/pages\/1237\/revisions\/1261"}],"wp:attachment":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/media?parent=1237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}