BlackBox View BlackBox
Find leaked credentials by scanning repositories for high entropy strings.
Showing 11255 tools • Searched in 3ms
Find leaked credentials by scanning repositories for high entropy strings.
Exiv2 is a C++ library and command-line utility for image metadata manipulation.
A toolkit that transforms PHP applications into web-based high-interaction Honeypots for monitoring and analyzing attacks.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
AWS IAM Access Analyzer is a tool for implementing and maintaining least privilege access in AWS environments through automated analysis and validation of IAM policies and permissions.
A series of vulnerable virtual machine images with documentation to teach Linux, Apache, PHP, MySQL security.
Realtime privacy monitoring service for smartphones that analyzes how apps handle private information.
ASPIA InfoTech offers a unified platform for enterprise security workflow automation with solutions spanning application security, vulnerability management, GRC, and security incident management.
A collection of detections for Panther SIEM with detailed setup instructions.
A cloud-based DAST solution that discovers, inventories, and tests web applications and APIs for security vulnerabilities across diverse environments.
Report on a malicious module posing as a cookie parsing library on npm blog archive.
Dissect is a digital forensics & incident response framework that simplifies the analysis of forensic artefacts from various disk and file formats.
A honeypot tool to mimic the router backdoor 'TCP32764' found in various router firmwares, providing a way to test for vulnerabilities.
Online cybersecurity conference with speakers' talks and interactive Q&A sessions.
JavaScript library scanner and SBOM generator
Exhaustive checklist for securing Node.js web services with a focus on error handling and custom error pages.
A front-end JavaScript toolkit for creating DNS rebinding attacks
A collection of CTF source files and write-ups that anyone can contribute to.
Repository of Yara Rules created by TjNel.
Web application for visualizing live GPS locations on an SVG world map using honeypot captures.
Detect capabilities in executable files and identify potential behaviors.
A next-generation web scanner that identifies websites and recognizes web technologies, including content management systems, blogging platforms, and more.