Tumeryk View Tumeryk
Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.
Showing 11256 tools • Searched in 4ms
Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.
A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation
A free online wargame for practicing hacking skills and learning security concepts.
A low-interaction honeypot for detecting and analyzing potential attacks on Android devices via ADB over TCP/IP
A cross-platform registry hive editor for forensic analysis with advanced features like hex viewer and reporting engine.
Darkarmour is a Windows AV evasion tool that helps bypass antivirus software, allowing for the creation of undetectable malware.
A blog post discussing the often overlooked dangers of CSV injection in applications.
Helm plugin for cryptographically signing and verifying charts with GnuPG integration.
A summary of the threat modeling posts and final thoughts on the process
GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
A backend agnostic debugger frontend for debugging binaries without source code access.
Threat intelligence and digital risk protection platform
A library for forward compatibility with PHP password functions.
The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.
A collaborative platform that gathers and analyzes security data to help professionals identify and mitigate cyber threats.
TrojAI is an AI security platform that detects vulnerabilities in AI models and defends against attacks on AI applications.
DNS spoofer tool for redirecting DNS lookup requests.
A collection of binary tools for various purposes including linking, assembling, profiling, and more.
Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.
Qwiet AI is an application security platform that combines SAST, SCA, container security, secrets detection, and SBOM scanning with AI-powered vulnerability prioritization and automated fix generation.
A KDE Plasma 4 widget that displays real-time traffic information for active network connections on Linux computers.
Cloud Custodian (c7n) is a rules engine for managing public cloud accounts and resources with a focus on security, compliance, and cost optimization.
A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.
A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.