Tools

Practical utilities for CVE analysis, triage, and blue-team workflow.

These tools are additive to the portal, not a separate product. Use them to score, parse, extract, and normalize the data you already investigate in Vuln Signal.

Extract & Normalize IOC + Patterns

Turn advisory text, indicators, and noisy strings into clean values.

Score & Validate CVSS + Versions

Score severity, parse product identifiers, and check affected ranges.

Draft Detection Hunts + Rules

Convert validated signal into KQL, Splunk, Sigma, or YARA starters.

Inspect Artifacts Logs + Payloads

Decode, format, diff, hash, and normalize investigation artifacts locally.

Infrastructure DNS + TLS + Ranges

Review domains, certificates, mail-auth posture, and network ranges.

Start with the tool you need right now

Each tool now has its own page so it can grow without turning the Tools section into one giant utility dump.

Patch Team

Score and validate before assigning work

Use Score & Validate first, then Inspect Artifacts for diffs, timestamps, and supporting evidence.

SOC / Hunter

Move from signal into searches and rules

Use Extract & Normalize, then Draft Detection. Keep source context and tuning caveats attached.

Infra / Email

Check domains, mail, certs, and identity clues

Use Infrastructure and Email & Identity when the question is ownership, routing, token context, or mail posture.

Try tools without hunting for pasteable input first

CVSS Calculator

Score base severity from CVSS v3.1 inputs and validate vendor or NVD-style vectors quickly.

Open tool

IOC Extractor

Extract IPs, domains, emails, URLs, hashes, and CVE IDs from advisories or investigation notes.

Open tool

IOC Normalizer

Normalize, deduplicate, and classify IOC lists before exporting to tickets, detections, or hunts.

Open tool

Defang / Refang

Safely share indicators by defanging domains, URLs, emails, and IP-like values, or refang them for searching.

Open tool

MITRE ATT&CK Lookup

Search common ATT&CK techniques, platforms, and quick detection notes without leaving the portal.

Open tool

CPE Parser

Turn raw CPE strings into readable vendor, product, version, and platform fields.

Open tool

Exposure Checker

Compare installed versions against affected and fixed ranges to support quick patch-triage decisions.

Open tool

Timestamp Converter

Convert Unix, Unix-ms, ISO, and human-readable time strings into a normalized view.

Open tool

JSON Formatter

Validate and pretty-print JSON payloads during triage, API review, or feed inspection.

Open tool

JWT Decoder

Decode JWT header and payload claims locally without sending the token anywhere.

Open tool

Email Header Analyzer

Parse sender paths, received hops, and SPF/DKIM/DMARC style results for phishing review.

Open tool

SPF / DKIM / DMARC Checker

Look up mail-auth TXT records for a domain and inspect the returned policy values quickly.

Open tool

Base64 Encode / Decode

Quickly convert strings between raw text and Base64 during investigations and payload review.

Open tool

Hash Generator

Generate SHA-1, SHA-256, and SHA-512 digests or validate whether a pasted value looks like a known hash.

Open tool

Regex Tester

Test expressions against sample text and see the matched values without leaving the portal.

Open tool

Password Strength Checker

Estimate password strength locally using length, variety, and common weakness patterns.

Open tool

YAML / JSON Converter

Convert basic YAML-like key/value structures into JSON and JSON objects into readable YAML-style output.

Open tool

Diff Viewer

Compare two blocks of text line by line when you need to review config drift or advisory changes.

Open tool

Subnet Calculator

Calculate mask, usable range, broadcast, and host count from an IPv4 CIDR.

Open tool

CIDR / IP Range Calculator

Check whether an IP belongs to a CIDR block or whether two ranges overlap.

Open tool

TLS / Certificate Decoder

Inspect PEM certificates, compute fingerprints, and extract issuer, subject, validity, and SAN details.

Open tool

DNS / WHOIS / ASN Lookup

Resolve A, MX, and TXT answers alongside RDAP ownership and registration context.

Open tool

Log Parser / Prettifier

Normalize JSON, key-value, and Apache-style logs into structured output during triage.

Open tool

Sigma Helper

Generate a starter Sigma rule from suspicious strings or indicators when you need a quick detection draft.

Open tool

Hunt Query Helper

Generate starter KQL and Splunk hunt queries from pasted IOCs so you can move from intel to search quickly.

Open tool

YARA Helper

Generate a starter YARA rule from suspicious strings, paths, or domains for quick artifact-matching drafts.

Open tool