Home / Search

Search Tools

Showing 11256 tools • Searched in 4ms

Tumeryk
Free

Tumeryk View Tumeryk

Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.

TruffleHog
Free

TruffleHog View TruffleHog

A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation

Tugarecon
Free

Tugarecon View Tugarecon

A free online wargame for practicing hacking skills and learning security concepts.

Turbolist3r
Free

Turbolist3r View Turbolist3r

A low-interaction honeypot for detecting and analyzing potential attacks on Android devices via ADB over TCP/IP

Turbinia
Free

Turbinia View Turbinia

A cross-platform registry hive editor for forensic analysis with advanced features like hex viewer and reporting engine.

Turbo Intruder Scripts
Free

Turbo Intruder Scripts View Turbo Intruder Scripts

Darkarmour is a Windows AV evasion tool that helps bypass antivirus software, allowing for the creation of undetectable malware.

Turbo Intruder
Free

Turbo Intruder View Turbo Intruder

A blog post discussing the often overlooked dangers of CSV injection in applications.

Tweetable Polyglot PNG
Free

Tweetable Polyglot PNG View Tweetable Polyglot PNG

Helm plugin for cryptographically signing and verifying charts with GnuPG integration.

Umbrella Investigate API
Free

Umbrella Investigate API View Umbrella Investigate API

A summary of the threat modeling posts and final thoughts on the process

Twisted Honeypots
Free

Twisted Honeypots View Twisted Honeypots

GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

UDcide
Free

UDcide View UDcide

A backend agnostic debugger frontend for debugging binaries without source code access.

Twitter's Vine Source Code Dump
Free

Twitter's Vine Source Code Dump View Twitter's Vine Source Code Dump

Threat intelligence and digital risk protection platform

Ultimate AppLocker Bypass List
Free

Ultimate AppLocker Bypass List View Ultimate AppLocker Bypass List

A library for forward compatibility with PHP password functions.

TypeDB CTI
Free

TypeDB CTI View TypeDB CTI

The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.

TypeDB Blog
Free

TypeDB Blog View TypeDB Blog

A collaborative platform that gathers and analyzes security data to help professionals identify and mitigate cyber threats.

Unbound Security
Free

Unbound Security View Unbound Security

TrojAI is an AI security platform that detects vulnerabilities in AI models and defends against attacks on AI applications.

TypeError/domained
Free

TypeError/domained View TypeError/domained

DNS spoofer tool for redirecting DNS lookup requests.

Two-Factor Authentication for SSH Login on Linux
Free

Two-Factor Authentication for SSH Login on Linux View Two-Factor Authentication for SSH Login on Linux

A collection of binary tools for various purposes including linking, assembling, profiling, and more.

uncompyle6
Free

uncompyle6 View uncompyle6

Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.

UglifyJS 3
Free

UglifyJS 3 View UglifyJS 3

Qwiet AI is an application security platform that combines SAST, SCA, container security, secrets detection, and SBOM scanning with AI-powered vulnerability prioritization and automated fix generation.

unfurl
Free

unfurl View unfurl

A KDE Plasma 4 widget that displays real-time traffic information for active network connections on Linux computers.

Understanding Docker container escapes
Free

Understanding Docker container escapes View Understanding Docker container escapes

Cloud Custodian (c7n) is a rules engine for managing public cloud accounts and resources with a focus on security, compliance, and cost optimization.

Unfetter
Free

Unfetter View Unfetter

A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.

Universal Book Links
Free

Universal Book Links View Universal Book Links

A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.