Google Cloud Incident Response Cheat Sheet
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
Showing 11254 tools • Searched in 3ms
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
GridPot is a cybersecurity tool that integrates GridLAB-D, Conpot, and libiec61850 to simulate and detect attacks on industrial control systems (ICS).
Email collection point designed to trap spammers and blacklist IPs.
C# wrapper around Yara pattern matching library with Loki and Yara signature support.
SecTor has built a reputation of bringing together experts from around the world to share their latest research and techniques involving underground threats and corporate defences.
A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files or live network traffic.
echoCTF is a computer security framework for running cybersecurity exercises and competitions like Capture the Flag, used for network penetration testing and security auditing.
A blog about various cybersecurity-related topics, including home networking, compiler development, and security vulnerabilities.
Rip web accessible (distributed) version control systems: SVN, GIT, Mercurial/hg, bzr, ...
A DNS rebinding attack framework for security researchers and penetration testers.
Catch up on the latest cybersecurity news and updates from around the world.
An open-source security tool for AWS, Azure, Google Cloud, and Kubernetes security assessments and audits.
A tool that reads IP packets from the network or a tcpdump save file and writes an ASCII summary of the packet data.
Collection of penetration testing scripts for AWS with a focus on reconnaissance.
SSLyze is a fast and powerful SSL/TLS scanning tool and Python library with a focus on speed, reliability, and ease of integration.
Apache Metron is a centralized tool for security monitoring and analysis that integrates various open-source big data technologies.
A collection of security vulnerabilities in regular expressions used in WAFs with a focus on bypass examples and high severity issues.