Role access: All authenticated users can access the Tools section.
Overview
The Tools section provides utility tools commonly used during penetration testing and project management. It is organized into three tabs: SMS, Generators, and Calculator.
SMS Tab
The SMS tab provides phone numbers for SMS testing and an embedded tracking spreadsheet.
SMS Tracking
An embedded Google Sheets iframe displays the SMS tracking spreadsheet for monitoring incoming messages.
Generators Tab
The Generators tab provides tools for generating test data.
Israeli ID Generator
Generate valid 9-digit Israeli ID numbers for testing purposes.
- Click Generate to create a new valid ID
- The generated ID is automatically copied to your clipboard
- Uses a Luhn-like algorithm to produce valid IDs
Israeli ID Validator
Validate whether a 9-digit Israeli ID number is valid.
- Enter a 9-digit number in the input field
- Real-time validation feedback: Valid (green) or Not valid (red)
YOPMail Email Generator
Generate disposable email addresses for testing.
- Click Generate to create 4 random YOPMail addresses
- Format:
cleargate[random]@yopmail.com
- Generated emails are displayed in a text area and copied to clipboard
- Click Open Mailboxes to open all generated mailboxes in new browser tabs
Password Generator
Generate random passwords with configurable options.
| Option | Description |
|---|
| Uppercase Letters | Include uppercase A-Z |
| Numbers | Include digits 0-9 |
| Symbols | Include special characters |
| Length | Slider to set password length (3-20 characters) |
- Click Generate to create a password
- The password is automatically copied to your clipboard
Calculator Tab (OWASP Risk Assessment)
The OWASP Risk Assessment Calculator helps you calculate the overall risk severity of a vulnerability based on the OWASP Risk Rating Methodology.
Factor Groups
The calculator is organized into four factor groups in a 2x2 grid:
1. Threat Agent Factors
| Factor | Scale | Description |
|---|
| Skill Level | 1-9 | Attacker’s technical skill |
| Motive | 1, 4, 9 | Attacker’s motivation |
| Opportunity | 0, 4, 7, 9 | Window of opportunity |
| Size | 2, 4, 5, 6, 9 | Size of the threat agent group |
2. Vulnerability Factors
| Factor | Scale | Description |
|---|
| Ease of Discovery | 1, 3, 7, 9 | How easy to find the vulnerability |
| Ease of Exploit | 1, 3, 5, 9 | How easy to exploit |
| Awareness | 1, 4, 6, 9 | How well known the vulnerability is |
| Intrusion Detection | 1, 3, 8, 9 | Likelihood of detection |
3. Technical Impact Factors
| Factor | Scale | Description |
|---|
| Loss of Confidentiality | 2-9 | Data exposure impact |
| Loss of Integrity | 1-9 | Data modification impact |
| Loss of Availability | 1, 5, 7, 9 | Service disruption impact |
| Loss of Accountability | 1, 7, 9 | Audit trail impact |
4. Business Impact Factors
| Factor | Scale | Description |
|---|
| Financial Damage | 1, 3, 7, 9 | Financial loss potential |
| Reputation Damage | 1, 4, 5, 9 | Brand/reputation impact |
| Non-compliance | 2, 5, 7 | Regulatory impact |
| Privacy Violation | 3, 5, 7, 9 | Privacy breach severity |
Severity Calculation
The calculator computes:
- Likelihood Score — average of Threat Agent and Vulnerability factors
- Impact Score — average of Technical Impact and Business Impact factors
- Overall Risk Severity — derived from the likelihood and impact scores
Severity Levels
| Severity | Color |
|---|
| NOTE | Green |
| LOW | Yellow |
| MEDIUM | Orange |
| HIGH | Red |
| CRITICAL | Magenta/Pink |
Risk Severity Matrix
A 3x3 matrix displays all possible combinations of likelihood and impact levels, highlighting the current selection with a ring indicator.
Severity Banner
A prominent banner at the top of the calculator displays the current overall risk severity, likelihood score, and impact score with color-coded indicators.
