so you wanted to be a smart ass, security researcher
Some security researchers want to be the smartest guy on the bloc and show off with the tools that they are working or developing. Instead they should just keep them after blocked doors and keep them secret and use them to secure their clients or networks. This is even more the case if those tools are on the borderline of security research and attack tools.
This is the presentation of JIKTO
These are links to the code http://busin3ss.name/jikto-in-the-wild (own risk - only for security researchers on their own domain) Is not complete.