Home / Search

Search Tools

Showing 11256 tools • Searched in 4ms

Stratus Red Team
Free

Stratus Red Team View Stratus Red Team

Ivy is a payload creation framework for executing arbitrary VBA source code directly in memory, utilizing programmatical access to load, decrypt, and execute shellcode.

StreamAlert
Free

StreamAlert View StreamAlert

Sysmon for Linux is a tool that monitors and logs system activity with advanced filtering to identify malicious activity.

StringSifter
Free

StringSifter View StringSifter

Repository for apps to be used in Shuffle with compatibility instructions.

Sticky-Keys-Slayer
Free

Sticky-Keys-Slayer View Sticky-Keys-Slayer

A tool that visits suspected phishing pages, takes screenshots, and extracts interesting files.

Sticky Elephant
Free

Sticky Elephant View Sticky Elephant

A DICOM server with a twist, blocking C-STORE attempts for protection but logging them.

Stixview
Free

Stixview View Stixview

A comprehensive and unrestricted dataset of security incidents for research and decision-making

Stowaway
Free

Stowaway View Stowaway

Static security code scanner (SAST) for Node.js applications with Docker support and integrations with Slack.

Strelka
Free

Strelka View Strelka

A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.

stoQ
Free

stoQ View stoQ

Fast and simple way to check any HTTP Headers

StepSecurity
Free

StepSecurity View StepSecurity

An application security platform that provides runtime threat modeling, vulnerability management, and automated remediation workflows with a focus on identifying exploitable vulnerabilities in production environments.

strings
Free

strings View strings

A simple Golang application for storing NIST National Software Reference Library Reference Data Set (NSRL RDS) with md5 and sha1 hash lookup searches.

Strobes ASPM
Free

Strobes ASPM View Strobes ASPM

A threat intelligence platform that provides comprehensive visibility into an organization's attack surface by collecting, analyzing, and structuring threat data to enable proactive security measures against emerging threats.

StrikeOne
Free

StrikeOne View StrikeOne

A platform that maps enterprise attack surfaces by consolidating asset inventory, prioritizing vulnerabilities based on exposure, and providing contextual visualization of security risks.

Strong Node.js
Free

Strong Node.js View Strong Node.js

Free Labs to Train Your Pentest / CTF Skills

Strengthen Your Phishing with Apache mod_rewrite and Mobile User Redirection
Free

Strengthen Your Phishing with Apache mod_rewrite and Mobile User Redirection View Strengthen Your Phishing with Apache mod_rewrite and Mobile User Redirection

A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.

Stronghold
Free

Stronghold View Stronghold

A DFIR Playbook Spec based on YAML for collaborative incident response processes.

Subfinder
Free

Subfinder View Subfinder

Express middleware for detecting and redirecting Tor or Surface users.

Sublist3r
Free

Sublist3r View Sublist3r

A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.

StrutsHoneypot
Free

StrutsHoneypot View StrutsHoneypot

Python web application honeypot with vulnerability type emulation and modular design.

Sublime Platform
Free

Sublime Platform View Sublime Platform

Machine learning project for intuitive threat analysis with a web interface.

SubOver
Free

SubOver View SubOver

A comprehensive dashboard for managing and monitoring honeypots with detailed information on attack attempts and connections.

Sublime Rules
Free

Sublime Rules View Sublime Rules

Detect and warn about potential malicious behaviors in Android applications through static analysis.

Subra
Free

Subra View Subra

High-interaction SSH honeypot for logging SSH proxy with ongoing development.

Subresource Integrity (SRI)
Free

Subresource Integrity (SRI) View Subresource Integrity (SRI)

Automatically redirect users from www to non-www for a secure connection.