Free Zero Trust & Security Tools
Generate production-ready configs, harden SSH, audit keys, build compliance reports, and secure your infrastructure — all in your browser, no signup required.
Zero Trust & Access Security
Generate configs, audit access, and build security artifacts
SSH Config Builder
PopularVisual multi-host SSH config generator with bastion chains, wildcard patterns, and best-practice defaults. Download ready-to-use config.
OpenSSH Hardening Generator
PopularLike Mozilla SSL Config but for sshd_config. Select OS, version, and security profile. Get a production-ready hardened config with explanations.
Database Connection Builder
Generate connection strings and code snippets for PostgreSQL, MySQL, MongoDB, Redis, SQL Server. All languages, all SSL modes.
User Provisioning Generator
Generate idempotent Linux user setup scripts with SSH keys, sudo policies, group membership, and rollback scripts.
Firewall Rules Generator
PopularDefine access policies and export as iptables, nftables, ufw, or cloud Terraform rules (AWS SG, Azure NSG, GCP Firewall).
Access Review Report Builder
Define users, resources, and access mappings. Get automated findings and export audit-ready quarterly review reports.
SSH Key Inventory Auditor
Paste SSH public keys and get a full audit: algorithm strength, bit length, duplicates, missing comments, and rotation recommendations.
Compliance Access Control Mapper
Cross-reference access control requirements across SOC 2, HIPAA, PCI-DSS, ISO 27001, and NIST 800-53. Track implementation and export.
Incident Response Playbook
Select a security scenario (compromised key, unauthorized access, privilege escalation) and get a step-by-step response playbook.
Attack Surface Analyzer
Input your exposed services and get risk-scored findings with a prioritized hardening roadmap. Identify vulnerabilities before attackers do.
AD User Audit PowerShell Generator
PopularGenerate PowerShell scripts to list Active Directory users active within the last 15, 30, 60, or 90 days. Optional group membership filter and CSV/HTML export.
AD Password Reset Generator
Generate PowerShell scripts to bulk-reset passwords for AD users active within 15–90 days. Filter by group, enforce complexity, export CSV audit logs.
AD Authentication Audit Generator
Generate PowerShell scripts to list all authentication events for an AD user within 15, 30, 60, or 90 days. Query Security Event Logs across Domain Controllers.
AD User Creation Generator
PopularGenerate PowerShell scripts to create complete Active Directory users with all attributes — identity, password, organization, groups, profile paths, and bulk CSV import.
AD Hardening Audit Generator
Generate comprehensive PowerShell scripts to audit AD hardening — password policies, Kerberos security, privileged access, stale objects, GPO settings, LDAP security, and DC health. CIS & NIST aligned.
LDAP + OpenSSH Auth Guide
Complete production guide to centralize SSH authentication with LDAP using SSSD, PAM, and public key lookup. Covers OpenLDAP and Active Directory on Ubuntu and RHEL.
RBAC Policy Generator
NewDefine roles, permissions, and resource access rules. Export role-based access control policies as JSON, YAML, or formatted policy documents for your access review.
Zero Trust Readiness
NewEvaluate your organization's Zero Trust readiness across identity, network, device, and data pillars. Get a scored report with actionable next steps.
SSH Banner Generator
NewCreate legal warning banners for SSH login. Generate /etc/issue, /etc/motd, and sshd_config Banner content with compliance-ready templates for SOC 2, HIPAA, and PCI DSS.
Network ACL Generator
NewBuild network access control lists for iptables, AWS Security Groups, Azure NSG, and GCP firewall rules. Define ingress and egress rules with CIDR notation and export.
Password Policy Generator
NewCreate enterprise password policies with complexity requirements, rotation schedules, and compliance mappings. Export as policy documents or PAM configuration.
MFA Readiness Assessment
NewEvaluate your organization's readiness for multi-factor authentication. Get recommendations for MFA methods, rollout strategy, and user communication plans.
Frequently Asked Questions
Everything you need to know about our free security tools and PumaGate