AfterGlow Cloud
Extracts resources (bitmaps, icons, cursors, AVI movies, HTML files, and more) from dll files
Showing 11254 tools • Searched in 5ms
Extracts resources (bitmaps, icons, cursors, AVI movies, HTML files, and more) from dll files
A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks
SentinelOne Purple AI is an AI-powered security analyst solution that simplifies threat hunting and investigations, empowers analysts, accelerates security operations, and safeguards data.
Repository documenting common techniques to bypass AppLocker with verified, unverified, and generic bypasses.
An automated security testing platform that performs AI-driven penetration testing and vulnerability assessment for web applications and APIs with compliance reporting capabilities.
A project that uses Athena and EventBridge to investigate API activity and notify of actions for incident response and misconfiguration detection.
Sangfor Technologies is a leading cybersecurity, cloud, and infrastructure vendor providing effective cybersecurity and efficient enterprise cloud solutions.
Zeus is a powerful tool for AWS EC2 / S3 / CloudTrail / CloudWatch / KMS best hardening practices with a focus on Identity and Access Management.
Command-line password manager with GnuPG encryption and colorful interface.
A subdomain scan tool that helps you find subdomains of a given domain.
A multi-threading tool for sniffing HTTP header records with support for offline and live sniffing, TCP flow statistics, and JSON output.
StepSecurity is a platform that enhances GitHub Actions security by providing network egress control, risk discovery, action replacement, and security best practices orchestration.
An API security platform that provides automated discovery, documentation, and continuous security testing throughout the API lifecycle.
XSS Polyglot Challenge - XSS payload running in multiple contexts for testing XSS.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.
Find leaked credentials by scanning repositories for high entropy strings.
A fast and flexible HTTP enumerator for content discovery and credential bruteforcing
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.
An open-source modern Dependency Walker for Windows developers.