🔍
No results found. Try a different search term.
Introduction
Exposurix Documentation
Exposurix is an all-in-one cybersecurity toolkit for individuals, freelancers, and small businesses who need professional-grade security monitoring — without a dedicated security team.
The platform combines dark web breach monitoring, 14 active security scanning tools, a Security Score engine, and automated alerts in a single dashboard. Every scan hits live targets — there is no cached or simulated data.
Getting Started
Quick Start Guide
You can start using Exposurix in under 3 minutes. No credit card required for the Free plan.
yourdomain.com), and click Scan. Within 30–60 seconds you'll get a score from 0–100 covering SSL, HTTP headers, email security, open ports, vulnerabilities, exposed files, and DNS.Feature
🛡️ Security Score
The Security Score gives you a single 0–100 aggregate rating for any domain by running 7 parallel checks and weighting each by impact. It's the fastest way to get a comprehensive security overview.
What gets scanned
p=reject scores full points; p=none scores partial..env, .git, database dumps, and admin panels. Any accessible sensitive file causes a major deduction.Grade scale
Remediation guide
Every finding below your target score includes a step-by-step fix guide — exact DNS records to add, Nginx/Apache config lines, and links to test your changes. The report can be exported as a PDF from the Security Score page.
Tools
Network Tools
Network tools analyze the external footprint of any domain or IP. All scans use live network requests against real targets.
Port 22 (SSH) — OPEN · Banner:
SSH-2.0-OpenSSH_8.9p1Port 443 (HTTPS) — OPEN
Port 3306 (MySQL) — OPEN ⚠️ High risk — database exposed
1-65535 for a full scan, but this takes longer. Start with 1-1000 to catch the most common services.Verify SPF: query TXT on your domain → look for
v=spf1 ...Verify DMARC: query TXT on
_dmarc.yourdomain.comCheck mail server: query MX → returns priority + mail server hostname
certbot renew --cron to avoid expiry. Render.com manages SSL automatically for custom domains.HSTS — forces HTTPS, prevents downgrade attacks
CSP — prevents XSS by restricting script sources
X-Frame-Options — prevents clickjacking attacks
add_header line per header in your server block.admin@, dev@, or ceo@ are publicly exposed, add them to your breach monitoring immediately.Tools
Security Tools
Threat intelligence and configuration analysis tools to identify vulnerabilities before attackers do.
Your password
hunter2 → SHA-1 hash → F3BBBD...We send
F3BBB to HIBP → they return all hashes starting with F3BBBYour browser checks locally if the full hash matches → no password transmitted
SPF — lists servers allowed to send email for your domain
DKIM — cryptographically signs outgoing emails so recipients can verify they weren't modified
DMARC — tells mail servers what to do if SPF/DKIM fail (none / quarantine / reject)
p=none to monitor, then move to p=quarantine, then p=reject once you're confident.remove_action('wp_head', 'wp_generator'); to your theme's functions.php..env files, .git directory exposure, database dumps, backup files, admin panels, and debug endpoints. An accessible .env exposes every API key and database password in your application..env file or .git directory, treat it as a critical incident — rotate all credentials immediately, then fix the exposure.
location ~ /\.(env|git|htpasswd) { deny all; return 404; }.env files to your web root. Use platform environment variables (Render env vars, Vercel env vars) instead.9.0–10.0 · CRITICAL — patch immediately
7.0–8.9 · HIGH — patch within 24–72 hours
4.0–6.9 · MEDIUM — patch within 1 week
0.1–3.9 · LOW — patch in next maintenance window
Tools
⚡ Generator Tools
Client-side generators that run entirely in your browser. Nothing is sent to any server — all computation happens locally using the browser's built-in cryptographic APIs.
window.crypto.getRandomValues() — the same API used by password managers. Configurable length (8–64 characters), character sets (uppercase, lowercase, numbers, symbols), with real-time strength scoring.add_header directives), Apache (.htaccess / mod_headers), and Cloudflare Workers (event listener with header injection). The generated configuration covers all major security headers: Strict-Transport-Security (HSTS) with includeSubDomains and preload, Content-Security-Policy, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and Permissions-Policy. All generation runs client-side — nothing is transmitted to Exposurix servers.server {} block, then run nginx -t && systemctl reload nginx to apply..htaccess file at the root of your site. Requires mod_headers to be enabled (a2enmod headers)._headers file at your site root if using Cloudflare Pages.next.config.js under the headers() async function. Deploy or restart the dev server to activate.sudo. Always confirm SSH (port 22) is allowed before running ufw enable — locking yourself out of a remote server is a common mistake.iptables-save > /etc/iptables/rules.v4 and restore on boot via iptables-restore or netfilter-persistent.aws ec2 authorize-security-group-ingress.Feature
📧 Email Breach Monitoring
Exposurix continuously monitors your email addresses against the HaveIBeenPwned database — the largest public breach database with 12+ billion compromised accounts across thousands of breaches.
How it works
Scan frequency by plan
| Plan | Manual scan | Auto scan | Email alerts |
|---|---|---|---|
| Free | 1× per 24h per email | — | — |
| Starter | Unlimited | Monthly (1st of month) | ✓ Instant |
| Pro | Unlimited | Weekly (Sundays) | ✓ Instant |
What to do if you find a breach
1. Change your password on the affected service immediately
2. If you reused that password elsewhere, change it on every other service
3. Enable 2-factor authentication on the affected account
4. Check your email account for suspicious login activity
5. If financial data was exposed, monitor your bank statements
Plans
Plans & Pricing
| Feature | Free | Starter $33/yr · $6/mo | Pro $87/yr · $9/mo |
|---|---|---|---|
| Monitored emails | 1 | 5 | 25 |
| Breach check frequency | 1× per 24h per email | Unlimited | Unlimited |
| Instant breach alerts (email) | ✗ | ✓ | ✓ |
| Weekly security report email | ✗ | ✓ | ✓ |
| Automatic email scan | ✗ | Monthly | Weekly |
| Free tools (DNS, SSL, WHOIS, Headers, Password, Email Spoofing, CVE Search) | ✓ | ✓ | ✓ |
| Security Score | ✗ | ✓ | ✓ |
| Starter+ tools (Port Scanner, Subdomain Finder, IP Reputation, Tech Stack, Exposed Files) | ✗ | ✓ | ✓ |
| Vulnerability Scanner — Deep Scan mode | ✗ | ✗ | ✓ |
| Email Harvester | ✗ | ✗ | ✓ |
| Scan history (last 100 scans) | ✗ | ✗ | ✓ |
| Export PDF security reports | ✗ | ✗ | ✓ |
| Export scan history as CSV | ✗ | ✗ | ✓ |
| Custom notification schedule | ✗ | ✓ | ✓ |
| 14-day Pro trial on signup | ✓ | ✓ | ✓ |
| Priority support | ✗ | ✗ | ✓ |
Trust
Security & Privacy
A cybersecurity platform that doesn't secure your data is worthless. Here's exactly how Exposurix handles your information.
xxxx...xxxx) is returned.FAQ
Frequently Asked Questions
Updates
📝 What's New
Latest updates and improvements to Exposurix.