Elastichoney
Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.
Showing 11254 tools • Searched in 3ms
Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.
A Command Line Map-Reduce tool for analyzing cowrie log files over time and creating visualizations and statistics.
A compliant audit log tool that provides a searchable, exportable record of read/write events.
A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.
A utility tool for decrypting data from weak public keys and attempting to recover the corresponding private key, primarily for educational purposes.
Hyara is a plugin that simplifies writing YARA rules with various convenient features.
Heimdal Enterprise provides a unified cybersecurity platform with advanced network and endpoint security solutions, including threat hunting and privileged access management.
A compilation of Red Teaming resources including cheatsheets, notes, scripts, and practice platforms for cybersecurity learning and skill development.
A post-exploitation tool for pentesting Active Directory
AbuseHelper is an open-source framework for receiving and redistributing abuse feeds and threat intel.
A de-obfuscator for M/o/Vfuscator, a notorious obfuscator, designed to reverse the effects of M/o/Vfuscator's obfuscation.
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
Porting GNU/Linux userland tools to the bionic/Linux userland of Android to provide access to the audit stream for Android applications with minimal overhead.
GPG Sync is a tool designed to keep OpenPGP public keys up-to-date within an organization by offloading the complexity of key management to a single trusted person.
Receive important notifications and updates related to North American electric grid security.
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
A managed Web Application and API Protection (WAAP) platform that combines WAF, API security, DDoS protection, and bot mitigation with 24/7 monitoring services.
An integrated application security platform that combines software composition analysis, container scanning, and runtime security monitoring to identify and prioritize vulnerabilities based on actual usage and risk.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.