Pick the option that fits your setup β no technical knowledge required for any of them.
Use any scanner right in your browser. No account needed.
π» Free downloadDownload and run from any terminal. Works on any computer.
π¦ OptionalInstall tools via OpenClaw. Great for automation and scheduling.
π₯οΈ Coming soonOne-click install for Windows and macOS. No terminal needed.
No account, no download, no setup. Just open your browser and start scanning.
Go to edgeiqlabs.com and click any tool in the Free Scanner section.
Type the URL or domain you want to check. For subdomain scans, just enter your domain (like example.com).
Results appear instantly. That's it. No signup, no API key, no waiting.
Download a tool, run it from your terminal. Takes about 2 minutes. Works on Windows, macOS, and Linux.
Open your terminal and run:
curl -sL https://edgeiqlabs.com/dl/edgeiq-ssl-checker.py -o edgeiq-ssl-checker.py
Point Python at the downloaded file:
python3 edgeiq-ssl-checker.py --domain example.com
Results print directly in your terminal. That's all there is to it.
Tests websites for XSS vulnerabilities using 40+ payloads and WAF bypass techniques.
curl -sL https://edgeiqlabs.com/dl/edgeiq-xss-scanner.py -o edgeiq-xss-scanner.py
python3 edgeiq-xss-scanner.py --target "https://example.com/search?q=test"
Scans IP addresses and domains for open ports, running services, and known CVE vulnerabilities.
curl -sL https://edgeiqlabs.com/dl/edgeiq-network-scanner.py -o edgeiq-network-scanner.py
python3 edgeiq-network-scanner.py --target example.com --ports 1-1000
Checks SSL certificate expiry, TLS versions, and security HTTP headers.
curl -sL https://edgeiqlabs.com/dl/edgeiq-ssl-checker.py -o edgeiq-ssl-checker.py
python3 edgeiq-ssl-checker.py --domain example.com
Discovers subdomains via public Certificate Transparency logs and checks for takeover risks.
curl -sL https://edgeiqlabs.com/dl/edgeiq-subdomain-hunter.py -o edgeiq-subdomain-hunter.py
python3 edgeiq-subdomain-hunter.py --domain example.com
Checks if an email address or domain appears in known data breaches.
curl -sL https://edgeiqlabs.com/dl/edgeiq-credential-checker.py -o edgeiq-credential-checker.py
python3 edgeiq-credential-checker.py --email [email protected]
Tests websites for SQL injection flaws by injecting safe test payloads into forms, URL parameters, and API endpoints.
curl -sL https://edgeiqlabs.com/dl/edgeiq-sql-injection-scanner.py -o edgeiq-sql-injection-scanner.py
python3 edgeiq-sql-injection-scanner.py --target "https://example.com/product?id=1"
Run a basic scan by pointing it at a URL with a parameter (like ?id=1):
python3 edgeiq-sql-injection-scanner.py --target "https://example.com/page?id=2"
Scan an entire website by pointing it at a sitemap:
python3 edgeiq-sql-injection-scanner.py --target "https://example.com" --scan-all
Save results to a file:
python3 edgeiq-sql-injection-scanner.py --target "https://example.com" --output report.json
β οΈ Only scan websites you own or have written permission to test. Unauthorized scanning is illegal.
Checks if OAuth login systems (Google, Facebook logins etc.) are securely configured and resistant to common attacks.
curl -sL https://edgeiqlabs.com/dl/edgeiq-oauth-checker.py -o edgeiq-oauth-checker.py
python3 edgeiq-oauth-checker.py --target "https://example.com/auth/login"
--target with your website's OAuth login URLTest a site's OAuth login flow:
python3 edgeiq-oauth-checker.py --target "https://example.com/oauth/login"
Run a deep check including state token validation:
python3 edgeiq-oauth-checker.py --target "https://example.com/oauth/login" --deep
Discovers undocumented API endpoints, Swagger/UML files, and developer portals that may be accidentally exposed.
curl -sL https://edgeiqlabs.com/dl/edgeiq-api-discovery.py -o edgeiq-api-discovery.py
python3 edgeiq-api-discovery.py --target "https://api.example.com"
example.com or api.example.comFind all endpoints on a domain:
python3 edgeiq-api-discovery.py --target "https://example.com"
Focus on a specific API subdomain:
python3 edgeiq-api-discovery.py --target "https://api.example.com" --deep
Scans your domain to find phishing pages that impersonate your brand, helping you take them down faster.
curl -sL https://edgeiqlabs.com/dl/edgeiq-phishing-kit-detector.py -o edgeiq-phishing-kit-detector.py
python3 edgeiq-phishing-kit-detector.py --domain example.com
yourcompany.comScan your domain for phishing kits:
python3 edgeiq-phishing-kit-detector.py --domain "yourcompany.com"
Get details on each kit found:
python3 edgeiq-phishing-kit-detector.py --domain "yourcompany.com" --verbose
Paste an email's raw headers and the tool checks for SPF, DKIM, DMARC failures, route anomalies, and signs of spoofing.
curl -sL https://edgeiqlabs.com/dl/edgeiq-email-header-analyzer.py -o edgeiq-email-header-analyzer.py
python3 edgeiq-email-header-analyzer.py --headers "Received: from mail.example.com..."
Analyze headers from a file:
python3 edgeiq-email-header-analyzer.py --file headers.txt
Check a single email header inline:
python3 edgeiq-email-header-analyzer.py --headers "From: [email protected]..."
Scans files or URLs against a database of known malware signatures and hash-based threat intelligence.
curl -sL https://edgeiqlabs.com/dl/edgeiq-malware-scanner.py -o edgeiq-malware-scanner.py
python3 edgeiq-malware-scanner.py --file suspicious.exe
suspicious.exe with the path to your fileScan a specific file:
python3 edgeiq-malware-scanner.py --file "/path/to/your/file.exe"
Scan a URL (to check a file before downloading):
python3 edgeiq-malware-scanner.py --url "https://example.com/downloads/software.exe"
Scan an entire folder:
python3 edgeiq-malware-scanner.py --folder "/path/to/downloads"
Enter a company domain and get back employee names, titles, LinkedIn profiles, and email addresses.
curl -sL https://edgeiqlabs.com/dl/edgeiq-lead-researcher.py -o edgeiq-lead-researcher.py
python3 edgeiq-lead-researcher.py --domain example.com
acme.comFind all leads from a company domain:
python3 edgeiq-lead-researcher.py --domain "acme.com"
Filter to only people with a specific job title:
python3 edgeiq-lead-researcher.py --domain "acme.com" --title "marketing"
Export leads to CSV:
python3 edgeiq-lead-researcher.py --domain "acme.com" --output leads.csv
Search for all businesses in a city or zip code β great for local marketing, B2B outreach, and market research.
curl -sL https://edgeiqlabs.com/dl/edgeiq-business-listing.py -o edgeiq-business-listing.py
python3 edgeiq-business-listing.py --city "New York" --state NY
"Austin" and TXFind all businesses in a city:
python3 edgeiq-business-listing.py --city "Austin" --state TX
Filter by business category:
python3 edgeiq-business-listing.py --city "Austin" --state TX --category "restaurants"
Save results to a file:
python3 edgeiq-business-listing.py --city "Austin" --state TX --output austin_businesses.csv
Combines results from multiple EdgeIQ tools into a polished PDF report with executive summary, technical findings, and remediation steps.
curl -sL https://edgeiqlabs.com/dl/edgeiq-report-generator.py -o edgeiq-report-generator.py
python3 edgeiq-report-generator.py --scan-results ./scan-output/ --output report.pdf
Generate a report from scan results:
python3 edgeiq-report-generator.py --scan-results ./my-scan-results/ --output security-report.pdf
Include your company name and logo:
python3 edgeiq-report-generator.py --scan-results ./my-scan-results/ --company "Acme Corp" --logo ./logo.png --output report.pdf
Connects EdgeIQ scan results to Discord, Slack, Telegram, or email so you never miss a critical vulnerability.
curl -sL https://edgeiqlabs.com/dl/edgeiq-alerting-system.py -o edgeiq-alerting-system.py
python3 edgeiq-alerting-system.py --configure --channel discord
Configure Discord alerts:
python3 edgeiq-alerting-system.py --configure --channel discord
Test the alert system:
python3 edgeiq-alerting-system.py --test
Connect to a specific EdgeIQ scan:
python3 edgeiq-xss-scanner.py --target "https://example.com" --alert --config edgeiq-alerting-system.json
Fix-it takes scan findings and runs approved remediation actions automatically (like SSL renewals, header hardening, and GitHub issue creation) so your team can move from alert to action faster.
curl -sL https://edgeiqlabs.com/dl/edgeiq-fixit-engine.py -o edgeiq-fixit-engine.py
python3 edgeiq-fixit-engine.py --setup
python3 edgeiq-fixit-engine.py --setup and choose your remediation modulesmanual or auto) and severity thresholdsRun a simulation (no live changes):
python3 edgeiq-fixit-engine.py --dry-run --input findings.json
Execute approved remediations:
python3 edgeiq-fixit-engine.py --apply --input findings.json
Schedule automatic runs every hour:
python3 edgeiq-fixit-engine.py --watch --interval 60
Tracks competitor websites and alerts you when prices change, products are added or removed, or landing pages are updated.
curl -sL https://edgeiqlabs.com/dl/edgeiq-market-watch.py -o edgeiq-market-watch.py
python3 edgeiq-market-watch.py --configure
Configure a new competitor watch:
python3 edgeiq-market-watch.py --configure
Manually run a check right now:
python3 edgeiq-market-watch.py --check "https://competitor.com/pricing"
View change history:
python3 edgeiq-market-watch.py --history --domain competitor.com
Scrapes competitor pricing data across multiple sites, organizes it into a comparison table, and calculates market positioning.
curl -sL https://edgeiqlabs.com/dl/edgeiq-price-intelligence.py -o edgeiq-price-intelligence.py
python3 edgeiq-price-intelligence.py --target "https://competitor.com/pricing"
Scrape a competitor's pricing page:
python3 edgeiq-price-intelligence.py --target "https://competitor.com/pricing"
Compare multiple competitors:
python3 edgeiq-price-intelligence.py --targets competitor1.csv competitor2.csv --compare
Export to spreadsheet:
python3 edgeiq-price-intelligence.py --target "https://competitor.com" --output pricing-analysis.csv
PhishSim sends realistic phishing test emails to your employees and tracks who clicks, reports, or falls for them β so you know exactly who needs more training.
# Download the PhishSim dashboard installer
curl -sL https://edgeiqlabs.com/dl/edgeiq-phishsim-setup.py -o edgeiq-phishsim-setup.py
python3 edgeiq-phishsim-setup.py --install
name and emailpython3 edgeiq-phishsim-setup.py --installLaunch a phishing campaign from the dashboard:
python3 edgeiq-phishsim-setup.py --launch --campaign "Q2 Security Test"
View campaign results:
python3 edgeiq-phishsim-setup.py --report --campaign "Q2 Security Test"
Add a new phishing template:
python3 edgeiq-phishsim-setup.py --add-template
The Dashboard gives you a single place to run all tools, see all results, manage subscriptions, and access reports β no terminal required.
# Download and run the Dashboard
curl -sL https://edgeiqlabs.com/dl/edgeiq-dashboard.py -o edgeiq-dashboard.py
python3 edgeiq-dashboard.py
python3 edgeiq-dashboard.pyhttp://localhost:8050Start the Dashboard:
python3 edgeiq-dashboard.py
Access from any device on your network (for Pro/Agency multi-seat):
python3 edgeiq-dashboard.py --host 0.0.0.0 --port 8050
Connect your API key for cloud-synced results:
python3 edgeiq-dashboard.py --api-key YOUR_API_KEY_HERE
If you prefer, install tools via pip so you can update them easily:
# Install all tools at once
pip install edgeiq-tools
# Or install tools individually
pip install edgeiq-xss-scanner edgeiq-ssl-watcher edgeiq-subdomain-hunter
# Update to latest version anytime
pip install --upgrade edgeiq-tools
Run scans on a schedule so you don't have to remember:
# Linux/macOS β schedule a daily SSL check at 9am
(crontab -l 2>/dev/null; echo "0 9 * * * python3 ~/edgeiq-ssl-checker.py --domain example.com --quiet") | crontab -
# Windows β open Task Scheduler and add a task pointing to:
# python C:\tools\elliq-ssl-checker.py --domain example.com
OpenClaw is an AI agent platform that runs on your computer. EdgeIQ tools are published on ClawHub so you can install them as OpenClaw skills. This is great if you want to automate scans, chain tools together, or run them on a schedule with your own AI assistant.
# macOS / Linux β paste in your terminal:
curl -fsSL https://openclaw.ai/install.sh | bash
# Windows β download from https://openclaw.ai
# Run the installer and follow the prompts
All EdgeIQ tools are published on ClawHub β search for "edgeiq" to see the full list:
# Search for all EdgeIQ tools
openclaw skills search edgeiq
# Install a specific tool
openclaw skills install edgeiq-xss-scanner
# Install multiple tools at once
openclaw skills install edgeiq-ssl-watcher edgeiq-network-scanner edgeiq-subdomain-hunter
# Run from your terminal β just talk to OpenClaw:
openclaw run edgeiq-xss-scanner --target "https://example.com/search?q=test"
# Or let OpenClaw's AI assistant choose the right tool:
openclaw "scan example.com for XSS vulnerabilities"
# Schedule a daily subdomain scan β OpenClaw runs it automatically
openclaw schedule add \
--name "Daily Subdomain Check" \
--skill edgeiq-subdomain-hunter \
--args "--domain example.com" \
--cron "0 8 * * *" \
--notify discord
# Install the EdgeIQ alerting system
openclaw skills install edgeiq-alerting-system
# Configure your Discord webhook
openclaw config set edgeiq-alerting-system DISCORD_WEBHOOK https://discord.com/api/webhooks/your-webhook
# Now any scan can send alerts to Discord automatically
openclaw run edgeiq-ssl-watcher --domain example.com --alert
When you upgrade a tool through OpenClaw, your Pro API key is shared across all installed EdgeIQ tools automatically. No need to configure each tool separately.
Native apps for Windows and macOS. One-click install, graphical interface, no terminal required.
π¦ Desktop app installer β in development. Email us to get notified when it's ready and get early access pricing.
No account, no download, no commitment. Try the free web scanners or download a terminal tool.
Browse free tools β