Access Undenied on AWS
Detect off-instance key usage in AWS by analyzing CloudTrail files locally.
Showing 11254 tools • Searched in 3ms
Detect off-instance key usage in AWS by analyzing CloudTrail files locally.
The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.
Personal website of Collin R. Mulliner with a focus on security research and mobile platforms.
A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.
Symantec Enterprise Cloud provides comprehensive cybersecurity for large enterprises, with a focus on data-centric hybrid security and innovation in threat and data protection.
A collection of reports and resources highlighting Android security vulnerabilities and best practices.
Open Source computer forensics platform with modular design for easy automation and scripting.
Repokid uses Access Advisor to remove unused service permissions from IAM roles in AWS.
A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.
QIRA is a competitor to strace and gdb with MIT license, supporting Ubuntu and Docker for wider compatibility.
Finds publicly known security vulnerabilities in a website's frontend JavaScript libraries.
A tool to run YARA rules against node_module folders to identify suspicious scripts
A cloud-based identity and access management solution that provides access governance, compliance monitoring, and risk management for hybrid environments.
A massive SQL injection vulnerability scanner
Sample security playbooks for security automation, orchestration and response (SOAR) using Microsoft Sentinel trigger
Dorothy is a tool to test monitoring and detection capabilities for Okta environments, with modules mapped to MITRE ATT&CK® tactics.
CrossC2 enables generation of cross-platform payloads for CobaltStrike, enhancing operational flexibility.
Akamai MFA is a cloud-based multi-factor authentication solution using FIDO2 standard to secure workforce logins across various applications through smartphone push notifications.
A comprehensive guide for using Docker with detailed information on prerequisites, installation, containers, images, networks, and more.
VIDOC is an AI-powered security tool that automates code review, detects and fixes vulnerabilities, and monitors external security, ensuring the integrity of both human-written and AI-generated code in software development pipelines.