Home / Search

Search Tools

Showing 11256 tools • Searched in 4ms

Dendrobate
Free

Dendrobate View Dendrobate

Collection of penetration testing scripts for AWS with a focus on reconnaissance.

delete-self-poc
Free

delete-self-poc View delete-self-poc

Automated tool for detecting steganographic content in images, with F5 detection capabilities.

DemonHunter
Free

DemonHunter View DemonHunter

A simple honeypot that collects credentials across various protocols

DenyHosts
Free

DenyHosts View DenyHosts

WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.

DET (extensible) Data Exfiltration Toolkit
Free

DET (extensible) Data Exfiltration Toolkit View DET (extensible) Data Exfiltration Toolkit

Sublist3r is a python tool for enumerating subdomains using OSINT and various search engines.

Dependencies
Free

Dependencies View Dependencies

A self-managed static code analysis platform that conducts continuous inspection of codebases to identify security vulnerabilities, bugs, and code quality issues.

Depix
Free

Depix View Depix

A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.

Department of Computer Science and Technology
Free

Department of Computer Science and Technology View Department of Computer Science and Technology

A public domain for use in illustrative examples in documents.

Detecting Lateral Movement through Tracking Event Logs (Version 2)
Free

Detecting Lateral Movement through Tracking Event Logs (Version 2) View Detecting Lateral Movement through Tracking Event Logs (Version 2)

Detailed analysis of the event-stream incident and actions taken by npm Security.

DerScanner
Free

DerScanner View DerScanner

Real-time, eBPF-based Security Observability and Runtime Enforcement component

DeTCT
Free

DeTCT View DeTCT

Panorays is a third-party cyber risk management platform that combines external attack surface monitoring with automated security questionnaires to assess, remediate, and continuously monitor vendor security postures.

Detecting the Elusive - Active Directory Threat Hunting
Free

Detecting the Elusive - Active Directory Threat Hunting View Detecting the Elusive - Active Directory Threat Hunting

Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.

detect-secrets
Free

detect-secrets View detect-secrets

A free and open-source tool for identifying vulnerabilities in Joomla-based websites.

Dependency Combobulator
Free

Dependency Combobulator View Dependency Combobulator

Backslash Security is an application security platform that uses reachability analysis to enhance SAST and SCA, prioritize vulnerabilities, and provide remediation guidance.

Detection and Hunting Signatures
Free

Detection and Hunting Signatures View Detection and Hunting Signatures

A simple IOC scanner bash script for Linux/Unix/OSX systems

Detection and Response Pipeline
Free

Detection and Response Pipeline View Detection and Response Pipeline

Incident response and digital forensics tool for transforming data sources and logs into graphs.

Detection Content Repository
Free

Detection Content Repository View Detection Content Repository

A Python library for handling TAXII v1.x Messages and invoking TAXII Services.

Developing StrongARM/Linux shellcode
Free

Developing StrongARM/Linux shellcode View Developing StrongARM/Linux shellcode

A platform offering hacking missions to test and enhance skills.

Detection Lab
Free

Detection Lab View Detection Lab

A daily updated list of the top 1 million websites in the world, ordered by referring subnets.

Detection Rules
Free

Detection Rules View Detection Rules

Python-based client for IBM XForce Exchange with an improved version available.

dex2jar
Free

dex2jar View dex2jar

A minimal library to generate YARA rules from JAVA with maven support.

DevOcean
Free

DevOcean View DevOcean

A DFIR console integrating various cybersecurity tools and frameworks for efficient incident response.

Detection Digest
Free

Detection Digest View Detection Digest

A comprehensive guide for using Docker with detailed information on prerequisites, installation, containers, images, networks, and more.

DFIR CTF: Precision Widgets of North Dakota Intrusion
Free

DFIR CTF: Precision Widgets of North Dakota Intrusion View DFIR CTF: Precision Widgets of North Dakota Intrusion

A comprehensive guide to Nessus, a vulnerability scanner, covering data directories, binary directories, logs directories, plugin directories, advanced settings, API, and good practices.