Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach
A simple JWT token brute force cracker
Showing 11254 tools • Searched in 3ms
A simple JWT token brute force cracker
Zeek Remote desktop fingerprinting script for fingerprinting Remote Desktop clients.
Open-source policy-as-code software for multi-cloud and SaaS environments with GPT model conversations and custom analysis policies.
A comprehensive guide for customizing Cobalt Strike's C2 profiles to enhance stealth and operational security.
Fail2ban is a daemon that scans log files and bans IPs showing malicious signs to protect servers from brute-force attacks.
An application security platform that provides runtime threat modeling, vulnerability management, and automated remediation workflows with a focus on identifying exploitable vulnerabilities in production environments.
The Contrast Runtime Security Platform is a suite of application security tools that integrates security into the software development lifecycle and production environments, including IAST, SAST, RASP, and SCA capabilities.
Open-source, free, and scalable cyber threat intelligence and security incident response solution with improved performance and new features.
SHIVA: Spam Honeypot with Intelligent Virtual Analyzer for capturing and analyzing spam data.
StepSecurity is a platform that enhances GitHub Actions security by providing network egress control, risk discovery, action replacement, and security best practices orchestration.
An Outlook add-in for reporting suspicious emails to security teams and tracking user behavior during awareness campaigns.
A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys.
A low interaction honeypot for detecting CVE-2018-0101 vulnerability in Cisco ASA component.
Innovative tool for mobile security researchers to analyze targets with static and dynamic analysis capabilities and sharing functionalities.
Automate version scraping and vulnerability scanning for Ruby on Rails stacks.
Open source security-oriented language for describing protocols and applying security policies on captured traffic.
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
A tool for fixing acquired .evt Windows Event Log files in digital forensics.
Repository of tools for testing iPhone messaging by Project Zero