Home / Search

Search Tools

Showing 11255 tools • Searched in 3ms

BlackBox
Free

BlackBox View BlackBox

Find leaked credentials by scanning repositories for high entropy strings.

Bitscout
Free

Bitscout View Bitscout

Exiv2 is a C++ library and command-line utility for image metadata manipulation.

Blacknet
Free

Blacknet View Blacknet

A toolkit that transforms PHP applications into web-based high-interaction Honeypots for monitoring and analyzing attacks.

Black Duck
Free

Black Duck View Black Duck

A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Bitwarden
Free

Bitwarden View Bitwarden

AWS IAM Access Analyzer is a tool for implementing and maintaining least privilege access in AWS environments through automated analysis and validation of IAM policies and permissions.

Blackhat Conference Presentation Slides
Free

Blackhat Conference Presentation Slides View Blackhat Conference Presentation Slides

A series of vulnerable virtual machine images with documentation to teach Linux, Apache, PHP, MySQL security.

BleachBit
Free

BleachBit View BleachBit

Realtime privacy monitoring service for smartphones that analyzes how apps handle private information.

BlackWidow
Free

BlackWidow View BlackWidow

A tool for analyzing TCP packet traces with color support.

Blackpanda Managed Security Services
Free

Blackpanda Managed Security Services View Blackpanda Managed Security Services

ASPIA InfoTech offers a unified platform for enterprise security workflow automation with solutions spanning application security, vulnerability management, GRC, and security incident management.

Blauhaunt
Free

Blauhaunt View Blauhaunt

A collection of detections for Panther SIEM with detailed setup instructions.

Blankie
Free

Blankie View Blankie

A cloud-based DAST solution that discovers, inventories, and tests web applications and APIs for security vulnerabilities across diverse environments.

Bleeping Computer
Free

Bleeping Computer View Bleeping Computer

Report on a malicious module posing as a cookie parsing library on npm blog archive.

Blinder
Free

Blinder View Blinder

Educational resources for reverse engineering tutorials by lena151.

BloodHound
Free

BloodHound View BloodHound

Dissect is a digital forensics & incident response framework that simplifies the analysis of forensic artefacts from various disk and file formats.

Bluepot
Free

Bluepot View Bluepot

A honeypot tool to mimic the router backdoor 'TCP32764' found in various router firmwares, providing a way to test for vulnerabilities.

Bmaptool
Free

Bmaptool View Bmaptool

Online cybersecurity conference with speakers' talks and interactive Q&A sessions.

Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder
Free

Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder View Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder

Exhaustive checklist for securing Node.js web services with a focus on error handling and custom error pages.

Boofuzz
Free

Boofuzz View Boofuzz

A front-end JavaScript toolkit for creating DNS rebinding attacks

BlueTeam.Lab
Free

BlueTeam.Lab View BlueTeam.Lab

A collection of CTF source files and write-ups that anyone can contribute to.

BlueBox Malware Analysis Box and Cyber Threat Hunting
Free

BlueBox Malware Analysis Box and Cyber Threat Hunting View BlueBox Malware Analysis Box and Cyber Threat Hunting

Repository of Yara Rules created by TjNel.

Boss of the SOC (BOTS) Dataset Version 2
Free

Boss of the SOC (BOTS) Dataset Version 2 View Boss of the SOC (BOTS) Dataset Version 2

Web application for visualizing live GPS locations on an SVG world map using honeypot captures.

bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence
Free

bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence View bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence

Detect capabilities in executable files and identify potential behaviors.

Boman.ai
Free

Boman.ai View Boman.ai

A next-generation web scanner that identifies websites and recognizes web technologies, including content management systems, blogging platforms, and more.