Stratus Red Team View Stratus Red Team
Ivy is a payload creation framework for executing arbitrary VBA source code directly in memory, utilizing programmatical access to load, decrypt, and execute shellcode.
Showing 11256 tools • Searched in 4ms
Ivy is a payload creation framework for executing arbitrary VBA source code directly in memory, utilizing programmatical access to load, decrypt, and execute shellcode.
Sysmon for Linux is a tool that monitors and logs system activity with advanced filtering to identify malicious activity.
Repository for apps to be used in Shuffle with compatibility instructions.
A tool that visits suspected phishing pages, takes screenshots, and extracts interesting files.
A DICOM server with a twist, blocking C-STORE attempts for protection but logging them.
A comprehensive and unrestricted dataset of security incidents for research and decision-making
Static security code scanner (SAST) for Node.js applications with Docker support and integrations with Slack.
A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.
An application security platform that provides runtime threat modeling, vulnerability management, and automated remediation workflows with a focus on identifying exploitable vulnerabilities in production environments.
A simple Golang application for storing NIST National Software Reference Library Reference Data Set (NSRL RDS) with md5 and sha1 hash lookup searches.
A threat intelligence platform that provides comprehensive visibility into an organization's attack surface by collecting, analyzing, and structuring threat data to enable proactive security measures against emerging threats.
A platform that maps enterprise attack surfaces by consolidating asset inventory, prioritizing vulnerabilities based on exposure, and providing contextual visualization of security risks.
A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.
A DFIR Playbook Spec based on YAML for collaborative incident response processes.
Express middleware for detecting and redirecting Tor or Surface users.
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
Python web application honeypot with vulnerability type emulation and modular design.
Machine learning project for intuitive threat analysis with a web interface.
A comprehensive dashboard for managing and monitoring honeypots with detailed information on attack attempts and connections.
Detect and warn about potential malicious behaviors in Android applications through static analysis.
High-interaction SSH honeypot for logging SSH proxy with ongoing development.
Automatically redirect users from www to non-www for a secure connection.