All Tools

Security Guides & Tutorials

Learn how to secure your website with our comprehensive, step-by-step guides. From SSL certificates to email authentication.

12 min read

Complete Guide to SSL/TLS Certificates

Learn everything about SSL certificates: how they work, types of certificates, installation guides, and troubleshooting common issues.

Topics covered:
  • What is SSL/TLS
  • Certificate Types
  • Installation Guide
  • Troubleshooting
  • Best Practices
15 min read

HTTP Security Headers Configuration Guide

Master HTTP security headers: Content-Security-Policy, HSTS, X-Frame-Options, and more. Includes copy-paste configurations for all platforms.

Topics covered:
  • CSP Explained
  • HSTS Setup
  • Nginx Config
  • Apache Config
  • Express.js
18 min read

Email Authentication Setup Guide

Protect your domain from email spoofing. Complete guide to setting up SPF, DKIM, and DMARC records for improved deliverability and security.

Topics covered:
  • SPF Records
  • DKIM Setup
  • DMARC Policies
  • Debugging
  • Best Practices
14 min read

CSP Checker Guide

Directive breakdowns, safer policy examples, troubleshooting, and validation steps for Content-Security-Policy hardening.

Topics covered:
  • Directive priorities
  • Policy examples
  • Troubleshooting
  • Validation
12 min read

HSTS Checker Guide

Rollout sequencing, preload readiness, transport examples, troubleshooting, and validation steps for Strict-Transport-Security.

Topics covered:
  • Directive table
  • Header examples
  • Troubleshooting
  • Validation
13 min read

Cookie Security Checker Guide

Flag-by-flag guidance, safer Set-Cookie examples, troubleshooting for auth flows, and post-fix validation for session hardening.

Topics covered:
  • Flag comparison
  • Set-Cookie examples
  • Troubleshooting
  • Validation
11 min read

HTTP Methods Checker Guide

Method risk tables, server examples, troubleshooting for APIs and preflights, and validation for safer verb exposure.

Topics covered:
  • Method risk table
  • Server examples
  • Troubleshooting
  • Validation
13 min read

CORS Checker Guide

Origin policy examples, risk tables, preflight troubleshooting, and validation steps for safer cross-origin configuration.

Topics covered:
  • Risk table
  • Allowlist examples
  • Troubleshooting
  • Validation
12 min read

Exposed Paths Checker Guide

Exposure classes, blocking examples, containment workflow, troubleshooting, and validation for sensitive path hardening.

Topics covered:
  • Exposure classes
  • Blocking examples
  • Troubleshooting
  • Validation
10 min read

security.txt Checker Guide

Field-by-field guidance, example files, troubleshooting, and validation steps for publishing security.txt correctly.

Topics covered:
  • Field table
  • Example file
  • Troubleshooting
  • Validation
11 min read

Redirect Chain Checker Guide

Chain optimization, server examples, troubleshooting for loops and proxy headers, and validation steps for cleaner redirects.

Topics covered:
  • Redirect patterns
  • Server examples
  • Troubleshooting
  • Validation
12 min read

Robots and Sitemap Checker Guide

Robots and sitemap examples, conflict tables, troubleshooting, and validation steps for crawl-facing infrastructure.

Topics covered:
  • Conflict table
  • Example files
  • Troubleshooting
  • Validation
11 min read

Mixed Content Checker Guide

Asset risk breakdowns, upgrade examples, troubleshooting, and validation steps for removing mixed-content issues.

Topics covered:
  • Asset risk table
  • Upgrade examples
  • Troubleshooting
  • Validation
14 min read

TLS Deep Analysis Guide

Protocol and cipher review, configuration examples, compatibility troubleshooting, and validation for stronger TLS posture.

Topics covered:
  • Protocol matrix
  • Config examples
  • Troubleshooting
  • Validation
13 min read

Email Security Checker Guide

Record-by-record guidance, DNS examples, troubleshooting, and validation steps for SPF, DKIM, and DMARC hardening.

Topics covered:
  • Protocol table
  • DNS examples
  • Troubleshooting
  • Validation
11 min read

Website Technology Fingerprint Guide

Exposure signals, server examples, troubleshooting, and validation steps for reducing public stack disclosure.

Topics covered:
  • Signal table
  • Server examples
  • Troubleshooting
  • Validation
12 min read

Passive Subdomain Discovery Guide

Subdomain classification, inventory examples, troubleshooting, and validation steps for external asset review.

Topics covered:
  • Classification table
  • Inventory example
  • Troubleshooting
  • Validation
13 min read

JS Library Vulnerability Checker Guide

Dependency triage, upgrade examples, troubleshooting, and validation steps for outdated frontend libraries.

Topics covered:
  • Risk table
  • Upgrade examples
  • Troubleshooting
  • Validation

Need a Complete Security Audit?

Our comprehensive vulnerability scanner tests for 50+ security issues including OWASP Top 10, SQL injection, XSS, and more.