traceroute-circl View traceroute-circl
A tool for parsing Google Protobuf encoded blobs without the accompanying definition, providing a colored representation of the contents.
Showing 11256 tools • Searched in 4ms
A tool for parsing Google Protobuf encoded blobs without the accompanying definition, providing a colored representation of the contents.
A static code analysis tool for parsing common data formats to detect hardcoded credentials and dangerous functions.
DerScanner is a comprehensive application security testing platform that combines SAST, DAST, MAST, SCA, and Binary Analysis capabilities with support for on-premises deployment and CI/CD integration.
Scumblr is a web application for periodic syncs of data sources and security analysis to streamline proactive security.
LogRhythm SIEM is a comprehensive security information and event management platform that collects, analyzes, and responds to security events across an organization's IT infrastructure.
A collaborative and open-source incident response platform for sharing observables among analysts.
Discover and understand the Docker Layer 2 ICC Bug and its implications on inter-container communication.
Microsoft Defender for Endpoint is a comprehensive endpoint security solution that provides industry-leading, multi-platform detection and response capabilities.
A static analysis framework for extracting key characteristics from various file formats
Runtime protection platform that secures AI applications, APIs, and cloud-native environments through automated threat detection and data protection mechanisms.
A setuid implementation of a subset of user namespaces, providing a way to run unprivileged containers without requiring root privileges.
AhnLab PLUS is a unified security platform providing comprehensive cybersecurity solutions for businesses.
A medium interaction printer honeypot that simulates a standard networked printer
A comprehensive guide to malware analysis and reverse engineering, covering topics such as lab setup, debugging, and anti-debugging.
A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.
Naked Security by Sophos offers expert insights and practical advice on cybersecurity threats and protection strategies.
A tool for dynamic analysis of mobile applications in a controlled environment.
View physical memory as files in a virtual file system for easy memory analysis and artifact access.
A honeypot that emulates a Belkin N300 Home Wireless router with default setup to observe traffic
CredStash is a tool for managing and securely storing credentials.
Toolkit for secure destruction of sensitive data with customizable overwrite methods.
FortiMail is an email security solution that protects organizations against phishing, ransomware, zero-day attacks, and business email compromise through multi-layered detection and prevention capabilities.