XRATOR View XRATOR
A threat intelligence platform that provides comprehensive visibility into an organization's attack surface by collecting, analyzing, and structuring threat data to enable proactive security measures against emerging threats.
Showing 11256 tools • Searched in 3ms
A threat intelligence platform that provides comprehensive visibility into an organization's attack surface by collecting, analyzing, and structuring threat data to enable proactive security measures against emerging threats.
A tool to remove malicious artifacts from Microsoft Office documents, preventing malware infections and data breaches.
Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.
Kiterunner is a tool for lightning-fast traditional content discovery and bruteforcing API endpoints in modern applications.
Real-time, eBPF-based Security Observability and Runtime Enforcement component
A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.
An easy to set up SSH honeypot for logging SSH connections and activity.
A Dynamic Application Security Testing (DAST) platform that provides automated security testing for web applications, APIs, and LLM-powered applications throughout the software development lifecycle.
A portable version of XSSHunter.com for finding and exploiting Cross-Site Scripting (XSS) vulnerabilities.
A simple XSS scanner tool for identifying Cross-Site Scripting vulnerabilities
A backend agnostic debugger frontend for debugging binaries without source code access.
An open-source tool for detecting and analyzing Android apps' vulnerabilities and security issues.
A tool to dump ODIN3 messages into files for reverse-engineering
A tool to locally check for signs of a rootkit with various checks and tests.
Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.
A Rust-based command-line tool for analyzing .apk files to detect vulnerabilities.
API security platform that combines discovery, testing, and monitoring capabilities to identify and protect against API vulnerabilities throughout the development lifecycle.
Hale is a botnet command & control monitor/spy with a modular design and various monitoring capabilities, including IRC and HTTP, to aid in botnet hunting and research.
XSS Polyglot Challenge - XSS payload running in multiple contexts for testing XSS.
Open source digital forensics tools for analyzing disk images and recovering files.
A console program for file recovery through data carving.