Home / Search

Search Tools

Showing 11254 tools • Searched in 3ms

Elastichoney
Free

Elastichoney

Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.

ELAT (Event Log Analysis Tool)
Free

ELAT (Event Log Analysis Tool)

A Command Line Map-Reduce tool for analyzing cowrie log files over time and creating visualizations and statistics.

Elastic
Free

Elastic

A compliant audit log tool that provides a searchable, exportable record of read/write events.

ElectricEye
Free

ElectricEye

A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.

ELFcrypt
Free

ELFcrypt

A utility tool for decrypting data from weak public keys and attempting to recover the corresponding private key, primarily for educational purposes.

Emulate Raspberry Pi with QEMU
Free

Emulate Raspberry Pi with QEMU

Hyara is a plugin that simplifies writing YARA rules with various convenient features.

Emsisoft Enterprise Security + EDR
Free

Emsisoft Enterprise Security + EDR

Heimdal Enterprise provides a unified cybersecurity platform with advanced network and endpoint security solutions, including threat hunting and privileged access management.

Enigma
Free

Enigma

A compilation of Red Teaming resources including cheatsheets, notes, scripts, and practice platforms for cybersecurity learning and skill development.

Empire Communication Profiles
Free

Empire Communication Profiles

A post-exploitation tool for pentesting Active Directory

Endlessh
Free

Endlessh

Multi-honeypot platform with various honeypots and monitoring tools.

EQL Analytics Library
Free

EQL Analytics Library

AbuseHelper is an open-source framework for receiving and redistributing abuse feeds and threat intel.

Enjarify by Google
Free

Enjarify by Google

A de-obfuscator for M/o/Vfuscator, a notorious obfuscator, designed to reverse the effects of M/o/Vfuscator's obfuscation.

Enumerate IAM Permissions
Free

Enumerate IAM Permissions

A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.

Ensnare
Free

Ensnare

Open source framework for network traffic analysis with advanced features.

Envalid
Free

Envalid

Porting GNU/Linux userland tools to the bionic/Linux userland of Android to provide access to the audit stream for Android applications with minimal overhead.

Entropy Source Evaluation
Free

Entropy Source Evaluation

GPG Sync is a tool designed to keep OpenPGP public keys up-to-date within an organization by offloading the complexity of key management to a single trusted person.

Enterprise Detection & Response: A Simple Hunting Maturity Model
Free

Enterprise Detection & Response: A Simple Hunting Maturity Model

Receive important notifications and updates related to North American electric grid security.

ENISA Training Resources
Free

ENISA Training Resources

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

Enjarify
Free

Enjarify

A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.

enum4linux-ng
Free

enum4linux-ng

A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.

EoHoneypotBundle
Free

EoHoneypotBundle

A managed Web Application and API Protection (WAAP) platform that combines WAF, API security, DDoS protection, and bot mitigation with 24/7 monitoring services.

ESC
Free

ESC

Andromeda makes reverse engineering of Android applications faster and easier.

Equixly API Security Platform
Free

Equixly API Security Platform

An integrated application security platform that combines software composition analysis, container scanning, and runtime security monitoring to identify and prioritize vulnerabilities based on actual usage and risk.

escape
Free

escape

A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.