22 Security Modules | Red Team · Blue Team · White Hat · OSINT
Cryptography
Analyze password entropy, patterns, and crack time estimation
Cryptography
Generate MD5, SHA1, SHA256, SHA512 hashes from text
Encoding
Base64, URL encoding, Hex, ROT13, Binary, Morse code
Authentication
Decode JWT tokens and inspect header/payload claims
Testing
Test regex patterns with live highlighting and matching
Cryptography
Generate cryptographically strong passwords with customizable options
Analysis
Extract IPs, domains, URLs, hashes, CVEs, and emails from text
Email Security
Paste email headers to detect spoofing, check SPF/DKIM/DMARC alignment
Networking
Calculate CIDR notation, network ranges, host addresses
Web Security
Parse URLs, detect suspicious patterns, phishing indicators
Web Security
Analyze security headers and response information
Scanning
Run: ./teksure scan --target <domain> --depth full
Certificates
Run: ./teksure ssl-check --domain <domain>
Security
Generate cryptographically strong passwords via command line
Cryptography
Run: ./teksure cipher --analyze <cipher-list>
Networking
Run: ./teksure port-scan --target <host> --range 1-65535
Compliance
Run: ./teksure compliance --check pci-dss,hipaa
Reconnaissance
Run: ./teksure dns --lookup <domain>
Reconnaissance
Run: ./teksure whois --domain <domain>
Reconnaissance
Run: ./teksure enum-subdomains --domain <domain> --wordlist large
Analysis
Run: ./teksure metadata --file <path> --extract all
Reconnaissance
Run: ./teksure social --username <username> --platforms all
TekSure Cyber AI Toolkit | Interactive Browser-Based Security Tools
For educational and authorized testing purposes only. All tools run locally in your browser — no data is sent anywhere.