ThreatModel SDK View ThreatModel SDK
A collection of tools and resources for threat hunters.
Showing 11256 tools • Searched in 3ms
A collection of tools and resources for threat hunters.
Freely available network IOCs for monitoring and incident response
Sysreptor offers a customizable reporting solution for penetration testing and red teaming.
JAADAS is a powerful tool for static analysis of Android applications, providing features like API misuse analysis and inter-procedure dataflow analysis.
A collection of Yara rules licensed under the DRL 1.1 License.
Honeypot for analyzing data with customizable services and logging capabilities.
Create checkpoint snapshots of the state of running pods for later off-line analysis.
A collaborative, multi-platform, red teaming framework for simulating attacks and testing defenses.
Exiv2 is a C++ library and command-line utility for image metadata manipulation.
Repository of templates for Ayehu's workflows with the ability to design, execute, and automate IT and business processes.
A sophisticated npm attack attributed to North Korean threat actors, targeting technology firms and their employees.
Passive SSL client fingerprinting tool using handshake analysis.
An API security and governance platform that provides discovery, security testing, compliance monitoring and lifecycle management capabilities for enterprise API implementations.
Collects and organizes Linux OS data for detailed analysis and incident response.
A cheat sheet for default credentials to aid in penetration testing and vulnerability assessment
A tool for analyzing TCP packet traces with color support.
Akamai MFA is a cloud-based multi-factor authentication solution using FIDO2 standard to secure workforce logins across various applications through smartphone push notifications.
An open-source security tool for testing data center resiliency to perimeter breaches and internal server infection.
Bluetooth Honeypot with monitoring capabilities
Dataplane.org is a nonprofit organization providing free data, tools, and analysis to increase awareness of Internet trends, anomalies, threats, and misconfigurations.
A tool for translating Dalvik bytecode to Java bytecode for analyzing Android applications.
Passive SSL client fingerprinting tool using handshake analysis.
A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.