SSRFmap View SSRFmap
Adversary emulation framework for testing security measures in network environments.
Showing 11256 tools • Searched in 3ms
Adversary emulation framework for testing security measures in network environments.
BunkerWeb is a next-generation and open-source Web Application Firewall (WAF) with seamless integration and user-friendly customization options.
A tool for malware analysts to search through base64-encoded samples and generate yara rules.
A Yara ruleset for detecting PHP shells and other webserver malware.
SANS Blog provides extensive cybersecurity training and certifications tailored to a wide range of IT security areas and skill levels.
HonnyPotter is a WordPress plugin that logs all failed login attempts, with a caution to use it at your own risk.
A collection of disposable and temporary email address domains used for spamming or abusing services.
A library for validating and accessing environment variables in Node.js programs
Node package for preparing CTF events with OWASP Juice Shop challenges for popular CTF frameworks.
A security solution that monitors, detects, and responds to insider threats by providing visibility into user activities across endpoints, email, and cloud to prevent data loss from careless, compromised, or malicious insiders.
A command line tool for transparently hiding files within images using LSB steganography.
A community-sourced repository of digital forensic artifacts in YAML format.
Cyera is a data security platform that discovers, classifies, and secures sensitive data across various environments, offering features such as DSPM, identity data access, and data privacy compliance.
Steganographic Swiss army knife for encoding and decoding data into images.
Red October is a software-based two-man rule style encryption and decryption server.
An open-source phishing toolkit for businesses and penetration testers.
A browser extension that helps you find and track sensitive data exposure across the web.
StegCloak is a JavaScript steganography module for hiding secrets inside text using invisible characters.
A machine learning-based approach to detect and prevent data breaches using natural language processing and machine learning algorithms.
A cloud-native, event-driven data pipeline toolkit for security teams with extensible data processing and serverless deployment.
An open-source phishing toolkit for businesses and penetration testers.
A powerful command-line packet analyzer and a portable C/C++ library for network traffic capture with comprehensive documentation.