Home / Knowledge Base / Miscellaneous

Miscellaneous

Diverse information and answers for all your miscellaneous questions and needs.

Try these 167 AI Miscellaneous Tools

ssh-audit by jtesta
Free

ssh-audit by jtesta View ssh-audit by jtesta

Community project for developing common guidelines and best practices for secure configurations.

Steampipe
Free

Steampipe View Steampipe

A library for validating and accessing environment variables in Node.js programs

SteelCon 2018
Free

SteelCon 2018 View SteelCon 2018

Node package for preparing CTF events with OWASP Juice Shop challenges for popular CTF frameworks.

stoQ
Free

stoQ View stoQ

Fast and simple way to check any HTTP Headers

SWFTools
Free

SWFTools View SWFTools

A CLI tool for signing and verifying npm and yarn packages.

TBV (Trust but Verify)
Free

TBV (Trust but Verify) View TBV (Trust but Verify)

A tool for SSH server auditing with comprehensive analysis capabilities.

ThreatCrowd API
Free

ThreatCrowd API View ThreatCrowd API

Kubernetes security platform with industry standard open source utilities for securing Kubernetes clusters and apps.

Two-Factor Authentication for SSH Login on Linux
Free

Two-Factor Authentication for SSH Login on Linux View Two-Factor Authentication for SSH Login on Linux

A collection of binary tools for various purposes including linking, assembling, profiling, and more.

University of Pisa Classroom Reservation System
Free

University of Pisa Classroom Reservation System View University of Pisa Classroom Reservation System

A command-line tool for parsing, creating, and manipulating JWT tokens

UPX
Free

UPX View UPX

Porting GNU/Linux userland tools to the bionic/Linux userland of Android to provide access to the audit stream for Android applications with minimal overhead.

urlgrab
Free

urlgrab View urlgrab

Community project for developing common guidelines and best practices for secure configurations.

urandom vs. CSPRNG for Crypto Keys
Free

urandom vs. CSPRNG for Crypto Keys View urandom vs. CSPRNG for Crypto Keys

A tool to secure your shell commands history by clearing sensitive commands

Vanguards Onion Service Addon
Free

Vanguards Onion Service Addon View Vanguards Onion Service Addon

A visualization tool for uploading and visualizing data as graphs on-the-fly, based on AfterGlow and running on Django.

validator.js
Free

validator.js View validator.js

Top 15 recommendations to protect your business from email-borne threats with Security Gateway.

vim-yara
Free

vim-yara View vim-yara

AWS account compliance using centrally managed Config Rules

Vim Syntax Highlighting for YARA Rules
Free

Vim Syntax Highlighting for YARA Rules View Vim Syntax Highlighting for YARA Rules

A set of instructions for the Dalvik virtual machine to manipulate registers and values in Android applications.

Watchmen
Free

Watchmen View Watchmen

A comprehensive collection of resources for learning ARM assembly language and shellcode development.

Workbench
Free

Workbench View Workbench

A CLI tool for signing and verifying npm and yarn packages.

WPMissionControl
Free

WPMissionControl View WPMissionControl

A scalable python framework for security research and development teams.

YARA package for Sublime Text
Free

YARA package for Sublime Text View YARA package for Sublime Text

Cybersecurity conference featuring talks on various hacking topics by industry experts.

YARA-sort
Free

YARA-sort View YARA-sort

A project with Terraform and Ansible scripts to create an orchestrated BlueTeam Lab for testing attacks and forensic artifacts on Windows environment.

Zero Online Banking
Free

Zero Online Banking View Zero Online Banking

Online cybersecurity conference with speakers' talks and interactive Q&A sessions.

Guardey
Free

Guardey View Guardey

Guardey delivers enterprise-grade cybersecurity solutions tailored for small and medium-sized businesses, ensuring robust protection for your workforce across all operational environments – office, home, or remote. Our platform leverages advanced VPN technology to create an encrypted tunnel for your internet traffic, guaranteeing privacy and anonymity. Simultaneously, our intelligent cyber alarm continuously analyzes network activity, adapting every 15 minutes to detect and neutralize emerging threats.

Enterprise-grade cybersecurity for SMEs
Secure VPN encryption for all internet traffic
Real-time threat detection and analysis