Home / Access Control / Specialized Security

Specialized Security

Advanced security solutions for robust access control and protection.

Try these 86 AI Specialized Security Tools

Geneva
Free

Geneva View Geneva

Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.

Gophish
Free

Gophish View Gophish

GridPot is a cybersecurity tool that integrates GridLAB-D, Conpot, and libiec61850 to simulate and detect attacks on industrial control systems (ICS).

GridPot
Free

GridPot View GridPot

A collection of disposable and temporary email address domains used for spamming or abusing services.

GRFICSv2
Free

GRFICSv2 View GRFICSv2

An open-source phishing toolkit for businesses and penetration testers.

GRFICS
Free

GRFICS View GRFICS

Inspeckage is a dynamic analysis tool for Android applications offering insights into app behavior and real-time monitoring capabilities.

Hardware Security Validation Environment
Free

Hardware Security Validation Environment View Hardware Security Validation Environment

A Graphical Realism Framework for Industrial Control Simulation organized as 5 VirtualBox VMs for realistic ICS network simulation.

Honeypot Spam Prevention for Laravel Applications
Free

Honeypot Spam Prevention for Laravel Applications View Honeypot Spam Prevention for Laravel Applications

StaDynA is a system supporting security app analysis in the presence of dynamic code update features.

House
Free

House View House

A security testing framework for Android with tools to search for vulnerabilities and interact with the Android Runtime.

InsecureShop
Free

InsecureShop View InsecureShop

A novel genetic algorithm for automating censorship evasion strategies.

Inspeckage
Free

Inspeckage View Inspeckage

An open-source project for dynamic analysis of Android applications using the Android Substrate framework.

Introspy-Android
Free

Introspy-Android View Introspy-Android

MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.

iRET
Free

iRET View iRET

An open-source phishing toolkit for businesses and penetration testers.

King Phisher
Free

King Phisher View King Phisher

A cross-platform software library for interacting with iOS devices without jailbreaking.

LavaMoat
Free

LavaMoat View LavaMoat

NotRuler is a tool for Exchange Admins to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler.

libimobiledevice
Free

libimobiledevice View libimobiledevice

A comprehensive collection of wordlists for bruteforcing and password cracking, covering various hashing algorithms and sizes.

LICSTER
Free

LICSTER View LICSTER

Python tool for monitoring user-select APIs in Android apps using Frida.

LockUp
Free

LockUp View LockUp

An open-source project for dynamic analysis of Android applications using the Android Substrate framework.

Low-cost ICS Testbed
Free

Low-cost ICS Testbed View Low-cost ICS Testbed

A cyber risk management platform that financially quantifies cyber risks and provides actionable mitigation strategies while integrating with insurance coverage.

mailspoof
Free

mailspoof View mailspoof

A security checklist app for your Mac that helps you with basic security hygiene and prevents 80% of problems.

ManaTI Project
Free

ManaTI Project View ManaTI Project

Web-based tool for browsing mobile applications sandbox and previewing SQLite databases.

MARA Framework
Free

MARA Framework View MARA Framework

Android vulnerability analysis system with efficient scanning and high accuracy.

Microsoft Exchange 2019 Transport Filtering Agent
Free

Microsoft Exchange 2019 Transport Filtering Agent View Microsoft Exchange 2019 Transport Filtering Agent

Extract local data storage of an Android application in one click.

Needle
Free

Needle View Needle

MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.