WeChall View WeChall
A penetration testing tool that focuses on web browser exploitation
Showing 11256 tools • Searched in 4ms
A penetration testing tool that focuses on web browser exploitation
A DevSecOps platform that combines SAST, DAST, SCA, and secret scanning with AI/ML-based analysis for continuous application security testing and vulnerability management.
A service that analyzes and visualizes security data to investigate potential security issues.
A popular free security tool for automatically finding security vulnerabilities in web applications
Zeus is a powerful tool for AWS EC2 / S3 / CloudTrail / CloudWatch / KMS best hardening practices with a focus on Identity and Access Management.
A tool that safely installs packages with npm/yarn by auditing them as part of your install process.
A login cracker that can be used to crack many types of authentication protocols.
A correlated injection proxy tool for XSS Hunter
Zania is an AI-driven platform that automates security and compliance tasks using autonomous agents for security inquiries, compliance assessments, and privacy regulation adherence.
A python tool for discovering endpoints, parameters, and wordlists in a given target
An automated code security tool that analyzes repositories, identifies vulnerabilities, and generates pull requests with fixes while integrating with existing development workflows.
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
Toolkit for performing acquisitions on iOS devices with logical and filesystem acquisition support.
Event Log Explorer is a software solution for viewing, analyzing, and monitoring events recorded in Microsoft Windows event logs, offering advanced features and efficient filtering capabilities.
A framework for accumulating, describing, and classifying actionable Incident Response techniques
A library for running basic functions from stripped binaries cross platform.
Deep Instinct is a predictive prevention platform that uses deep learning to prevent unknown threats, including ransomware and zero-day malware, from infiltrating storage environments, applications, and endpoints.
A continuous threat exposure management platform that provides automated vulnerability scanning for internet-facing assets with varying service tiers for different organizational needs.
A pocket reference guide providing various options for navigating and pivoting through different environments and situations.
A framework for accumulating, describing, and classifying actionable Incident Response techniques
Open-source initiative providing malicious and benign datasets to expedite data analysis and threat research.
Amass by OWASP performs comprehensive attack surface mapping and asset discovery.
A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.