Search Tools
Showing 11254 tools • Searched in 3ms
Bitscout
Exiv2 is a C++ library and command-line utility for image metadata manipulation.
Blacknet
A toolkit that transforms PHP applications into web-based high-interaction Honeypots for monitoring and analyzing attacks.
Black Duck
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
Bitwarden
AWS IAM Access Analyzer is a tool for implementing and maintaining least privilege access in AWS environments through automated analysis and validation of IAM policies and permissions.
Blackhat Conference Presentation Slides
A series of vulnerable virtual machine images with documentation to teach Linux, Apache, PHP, MySQL security.
BleachBit
Realtime privacy monitoring service for smartphones that analyzes how apps handle private information.
Blackpanda Managed Security Services
ASPIA InfoTech offers a unified platform for enterprise security workflow automation with solutions spanning application security, vulnerability management, GRC, and security incident management.
Blankie
A cloud-based DAST solution that discovers, inventories, and tests web applications and APIs for security vulnerabilities across diverse environments.
Bleeping Computer
Report on a malicious module posing as a cookie parsing library on npm blog archive.
BloodHound
Dissect is a digital forensics & incident response framework that simplifies the analysis of forensic artefacts from various disk and file formats.
Bluepot
A honeypot tool to mimic the router backdoor 'TCP32764' found in various router firmwares, providing a way to test for vulnerabilities.
Bmaptool
Online cybersecurity conference with speakers' talks and interactive Q&A sessions.
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder
Exhaustive checklist for securing Node.js web services with a focus on error handling and custom error pages.
BlueTeam.Lab
A collection of CTF source files and write-ups that anyone can contribute to.
BlueBox Malware Analysis Box and Cyber Threat Hunting
Repository of Yara Rules created by TjNel.
Boss of the SOC (BOTS) Dataset Version 2
Web application for visualizing live GPS locations on an SVG world map using honeypot captures.
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence
Detect capabilities in executable files and identify potential behaviors.
Boman.ai
A next-generation web scanner that identifies websites and recognizes web technologies, including content management systems, blogging platforms, and more.