YALIH YALIH View YALIH YALIH
A simple honeypot that collects credentials across various protocols
Showing 11256 tools • Searched in 3ms
A simple honeypot that collects credentials across various protocols
Cybersecurity tool merging DarunGrim's analysis algorithms, currently in internal testing for official release.
BotScout.com provides proactive bot detection, screening, and banning through a powerful API.
A tool that automatically audits website security by crawling an entire website and identifying vulnerabilities
A collection of Yara signatures for identifying malware and other threats
Multi-cloud antivirus scanning API with CLAMAV and YARA support for AWS S3, Azure Blob Storage, and GCP Cloud Storage.
Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.
The official security guide for Red Hat Enterprise Linux 7, providing detailed information on securing the operating system.
A debugger tool for reverse engineers, crackers, and security analysts, with a user-friendly debugging UI and custom agent support.
A collection of Yara rules for detecting malware evasion techniques
Standalone graphical utility for viewing Java source codes from ".class" files.
A library and tools to access and manipulate VMware Virtual Disk (VMDK) files.
Protect your Fastify server against CSRF attacks with a series of utilities and recommendations for secure application development.
Detect capabilities in executable files and identify potential behaviors.
PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.
Create deceptive webpages to deceive and redirect attackers away from real websites by cloning them.
A utility to generate malicious network traffic for security evaluation.
Cybersecurity conference featuring talks on various hacking topics by industry experts.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
A library of event-based analytics written in EQL to detect adversary behaviors, now integrated into the Detection Engine of Kibana.
A cutting-edge AI-based IT security platform that identifies malware and cyber-attacks within seconds
A tool that generates Yara rules from training data using logistic regression and random forest classifiers.
msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks with extensive functionality for log data analysis, threat intelligence enrichment, and visualization.
Platform for the latest threat intelligence information