Dendrobate
Collection of penetration testing scripts for AWS with a focus on reconnaissance.
Showing 11254 tools • Searched in 3ms
Collection of penetration testing scripts for AWS with a focus on reconnaissance.
Automated tool for detecting steganographic content in images, with F5 detection capabilities.
WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.
Sublist3r is a python tool for enumerating subdomains using OSINT and various search engines.
A self-managed static code analysis platform that conducts continuous inspection of codebases to identify security vulnerabilities, bugs, and code quality issues.
A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.
A public domain for use in illustrative examples in documents.
Detailed analysis of the event-stream incident and actions taken by npm Security.
Real-time, eBPF-based Security Observability and Runtime Enforcement component
Panorays is a third-party cyber risk management platform that combines external attack surface monitoring with automated security questionnaires to assess, remediate, and continuously monitor vendor security postures.
Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.
A free and open-source tool for identifying vulnerabilities in Joomla-based websites.
Backslash Security is an application security platform that uses reachability analysis to enhance SAST and SCA, prioritize vulnerabilities, and provide remediation guidance.
A simple IOC scanner bash script for Linux/Unix/OSX systems
Incident response and digital forensics tool for transforming data sources and logs into graphs.
A Python library for handling TAXII v1.x Messages and invoking TAXII Services.
A platform offering hacking missions to test and enhance skills.
A daily updated list of the top 1 million websites in the world, ordered by referring subnets.
Python-based client for IBM XForce Exchange with an improved version available.
A DFIR console integrating various cybersecurity tools and frameworks for efficient incident response.
A comprehensive guide for using Docker with detailed information on prerequisites, installation, containers, images, networks, and more.
A comprehensive guide to Nessus, a vulnerability scanner, covering data directories, binary directories, logs directories, plugin directories, advanced settings, API, and good practices.