Clevis
A demonstration of a method to delete a locked executable or currently running file from disk.
Showing 11254 tools • Searched in 3ms
A demonstration of a method to delete a locked executable or currently running file from disk.
A blog post discussing the often overlooked dangers of CSV injection in applications.
An open-source, drag-and-drop security workflow builder with integrated case management for automating security workflows and tackling alert fatigue.
Collection of Kubernetes manifests creating pods with elevated privileges for security testing.
Azucar is a multi-threaded plugin-based tool for assessing Azure Cloud security.
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
A one-stop online resource for cybersecurity degree programs in the US, offering information on undergraduate and graduate levels, online programs, and career options.
A cloud native application protection platform that provides unified visibility, risk assessment, and remediation capabilities across multi-cloud and hybrid environments.
Open-source cloud-agnostic resource manager for analyzing and managing cloud cost, usage, security, and governance.
A workload policy enforcement tool for Kubernetes with various supported policies and configuration options.
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Automatically compile AWS SCPs for compliant AWS services based on preferred frameworks.
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Automatically compile AWS SCPs for compliant AWS services based on preferred frameworks.
Nuvola is a tool for security analysis on AWS environments with a focus on creating a digital twin of cloud platforms.
Aqua Security is a CNAPP that provides comprehensive security for cloud native applications across their entire lifecycle, from development to production, in various cloud and container environments.
Monitors AWS and GCP accounts for policy changes and alerts on insecure configurations, with support for OpenStack and GitHub monitoring.
An AI-powered email security platform that provides multi-layered protection against phishing, malware, and other email-based threats through various deployment options.
Open-source tool for analyzing AWS temporary tokens to detect malicious activity.
A deliberately vulnerable modern day app with lots of DOM related bugs
A comprehensive cheat sheet for accessing Windows systems from Linux hosts using smbclient and rpcclient tools, covering password management, user and group enumeration, and more.
Managed Kubernetes Inspection Tool leveraging FOSS tools to query and validate security-related settings.