Home / Search

Search Tools

Showing 11254 tools • Searched in 3ms

Dendrobate
Free

Dendrobate

Collection of penetration testing scripts for AWS with a focus on reconnaissance.

delete-self-poc
Free

delete-self-poc

Automated tool for detecting steganographic content in images, with F5 detection capabilities.

DemonHunter
Free

DemonHunter

A simple honeypot that collects credentials across various protocols

DenyHosts
Free

DenyHosts

WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.

DET (extensible) Data Exfiltration Toolkit
Free

DET (extensible) Data Exfiltration Toolkit

Sublist3r is a python tool for enumerating subdomains using OSINT and various search engines.

Dependencies
Free

Dependencies

A self-managed static code analysis platform that conducts continuous inspection of codebases to identify security vulnerabilities, bugs, and code quality issues.

Depix
Free

Depix

A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.

Department of Computer Science and Technology
Free

Department of Computer Science and Technology

A public domain for use in illustrative examples in documents.

Detecting Lateral Movement through Tracking Event Logs (Version 2)
Free

Detecting Lateral Movement through Tracking Event Logs (Version 2)

Detailed analysis of the event-stream incident and actions taken by npm Security.

DerScanner
Free

DerScanner

Real-time, eBPF-based Security Observability and Runtime Enforcement component

DeTCT
Free

DeTCT

Panorays is a third-party cyber risk management platform that combines external attack surface monitoring with automated security questionnaires to assess, remediate, and continuously monitor vendor security postures.

Detecting the Elusive - Active Directory Threat Hunting
Free

Detecting the Elusive - Active Directory Threat Hunting

Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.

detect-secrets
Free

detect-secrets

A free and open-source tool for identifying vulnerabilities in Joomla-based websites.

Dependency Combobulator
Free

Dependency Combobulator

Backslash Security is an application security platform that uses reachability analysis to enhance SAST and SCA, prioritize vulnerabilities, and provide remediation guidance.

Detection and Hunting Signatures
Free

Detection and Hunting Signatures

A simple IOC scanner bash script for Linux/Unix/OSX systems

Detection and Response Pipeline
Free

Detection and Response Pipeline

Incident response and digital forensics tool for transforming data sources and logs into graphs.

Detection Content Repository
Free

Detection Content Repository

A Python library for handling TAXII v1.x Messages and invoking TAXII Services.

Developing StrongARM/Linux shellcode
Free

Developing StrongARM/Linux shellcode

A platform offering hacking missions to test and enhance skills.

Detection Lab
Free

Detection Lab

A daily updated list of the top 1 million websites in the world, ordered by referring subnets.

Detection Rules
Free

Detection Rules

Python-based client for IBM XForce Exchange with an improved version available.

dex2jar
Free

dex2jar

A minimal library to generate YARA rules from JAVA with maven support.

DevOcean
Free

DevOcean

A DFIR console integrating various cybersecurity tools and frameworks for efficient incident response.

Detection Digest
Free

Detection Digest

A comprehensive guide for using Docker with detailed information on prerequisites, installation, containers, images, networks, and more.

DFIR CTF: Precision Widgets of North Dakota Intrusion
Free

DFIR CTF: Precision Widgets of North Dakota Intrusion

A comprehensive guide to Nessus, a vulnerability scanner, covering data directories, binary directories, logs directories, plugin directories, advanced settings, API, and good practices.