Banyan Collector
Cloud Custodian (c7n) is a rules engine for managing public cloud accounts and resources with a focus on security, compliance, and cost optimization.
Showing 11254 tools • Searched in 3ms
Cloud Custodian (c7n) is a rules engine for managing public cloud accounts and resources with a focus on security, compliance, and cost optimization.
Infosec Resources provides extensive cybersecurity training and certifications to boost cybersecurity skills and careers.
A signature-based, multi-step, high interaction honeypot detection tool with support for various detection methods and protocols.
A lightweight, first-stage C2 implant written in Nim for remote access and control.
A PowerShell module for interacting with VirusTotal to analyze suspicious files and URLs.
Framework for creating jeopardy CTF challenges with configurable structure and efficient integration.
Ivy is a payload creation framework for executing arbitrary VBA source code directly in memory, utilizing programmatical access to load, decrypt, and execute shellcode.
Krakatau provides an assembler and disassembler for Java bytecode, supporting conversion, creation, examination, comparison, and decompilation of Java binaries.
A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
Facilitating exchange of information and knowledge to collectively protect against cyberattacks.
A tool to verify the integrity of PNG, JNG, and MNG files and extract detailed information about the image.
Apiiro ASPM Platform is an application security solution that provides code-to-runtime visibility, risk assessment, and remediation capabilities to help organizations manage and reduce security risks across their application portfolio.
Web interface for the Volatility Memory Analysis framework with advanced features.
A honeypot for malware that spreads via USB storage devices, detecting infections without further information.
An open source network penetration testing framework with automatic recon and scanning capabilities.
A forensics tool for tracking USB device artifacts on Linux machines.
A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.
JavaScript library scanner and SBOM generator
A repository of CTF challenges and resources from various cybersecurity competitions.