Subnet / CIDR helper
Type an IPv4 CIDR (for example 10.0.5.0/24) to see the
network, broadcast, mask, and usable host range.
Tools
These little utilities are here to answer the kinds of questions I get from teammates and customers all the time: “what does this subnet mean?”, “is this port normal?”, and how everything lines up in the OSI model.
Everything on this page runs purely in your browser. No data is sent anywhere — it's just JavaScript doing math and lookups.
Type an IPv4 CIDR (for example 10.0.5.0/24) to see the
network, broadcast, mask, and usable host range.
Pick a common port to see what it's usually used for and how I think about securing it on a firewall or edge device.
Click a layer to see how I think about it from a cybersecurity and CISO perspective.
Generate MD5, SHA-1, or SHA-256 for a string or IOC. This is for integrity checks and quick lookups — not for password storage.
Paste a JSON Web Token to quickly see the header and payload fields, algorithm, and key id. No secrets or signatures are touched.
These notes are here for the “what should I look at next?” moments during investigations — artifact locations, log sources, and fast triage prompts.
Places I usually check first for evidence across Windows, Linux, and macOS.
%ProgramData%,
%AppData%, startup items, scheduled tasks, services, and
registry run keys.
/var/log/*, ~/.ssh/authorized_keys,
/etc/ssh/sshd_config, cron jobs
(crontab -l, /etc/cron.*), and systemd units.
/var/log/, launch agents/daemons
(/Library/LaunchAgents, /Library/LaunchDaemons,
~/Library/LaunchAgents), and login items.
Logs that usually give the most signal per minute when you're triaging.
Fast, non-exhaustive prompts for the first 30–60 minutes of an incident.