Help & User Guides
Detailed, feature-by-feature documentation for every tool in the ITSecTools security validation suite. Select a guide below to learn how each feature works, what it tests, and how to interpret the results.
DLP Validator
File uploads (HTTP/HTTPS/FTP), download test documents, raw text POST, file metadata & label checker, regex creator & translator, and advanced payload generator.
NGFW Validation
IPS signature tests (SQLi, XSS, Path Traversal), Advanced Evasion Techniques, C2 beacon simulation, Run All Tests (9 attacks), Network IP Flooder (30 continuous attacks), IP shun cooldown, and console output interpretation.
MITRE ATT&CK Simulator
Kill chain concept, T1190 Apache Struts RCE, T1059.004 ThinkPHP RCE, T1003.001 Pulse Secure VPN, T1048.003 Shellshock Exfiltration, and results interpretation.
Threat Generation
EICAR standard test files, heuristic malware samples, ransomware simulator, and how to verify your endpoint or gateway AV blocked the download.
Network Pulse
Public IP detection, edge server identification, latency (RTT), jitter, packet loss, Path MTU discovery, AI security insights, and connection quality scoring.
ITSecTools Documentation & Getting Started
ITSecTools is a free, browser-based security validation suite that helps security teams, IT administrators, and compliance auditors test their network defenses without installing agents or purchasing subscriptions. Every tool runs directly in your browser — no downloads, no sign-ups, no data collection.
What Can You Test?
- Data Loss Prevention (DLP) — Upload sensitive test files, inspect metadata labels, build vendor-specific regex patterns, and generate evasion payloads to test Base64 encoding, renamed extensions, encrypted archives, and nested ZIPs.
- Next-Generation Firewall (NGFW) — Send real SQLi, XSS, Log4j, Shellshock, and C2 beacon payloads to verify IPS signatures, evasion detection, and application control. Includes a Network IP Flooder for continuous 30-attack stress tests.
- MITRE ATT&CK Kill Chain — Execute a sequential attack from Initial Access through Exfiltration to test if your perimeter can break the chain.
- Threat Protection — Download EICAR, heuristic malware, and ransomware test files to verify endpoint and gateway antivirus detection.
- Network Pulse — Identify your public IP, measure latency/jitter/packet loss, discover Path MTU, and get AI-generated security recommendations.
Who Is This For?
Security Operations Center (SOC) analysts, network engineers, compliance auditors, penetration testers, and anyone responsible for validating security controls. Whether you're testing a newly deployed firewall, verifying DLP policies after a vendor migration, or demonstrating security posture during an audit — ITSecTools provides the validation you need at zero cost.