Hash Extender View Hash Extender
A collection of payloads and methodologies for web pentesting.
Showing 11256 tools • Searched in 3ms
A collection of payloads and methodologies for web pentesting.
Instructions for setting up SIREN, including downloading Linux dependencies, cloning the repository, setting up virtual environment, installing pip requirements, running SIREN, setting up Snort on Pi, and MySQL setup.
A command-line tool for identifying NoSQL injection vulnerabilities in MongoDB databases
A Python 2.x tool for memory analysis on Mac OS X systems with support for various OS versions and memory image export capabilities.
A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.
A tool for scanning networks, enumerating Siemens PLCs, and gathering detailed information about them.
Octoscan is a static analysis tool that scans GitHub Actions workflows for security vulnerabilities and misconfigurations.
Python-based web server framework for setting up fake web servers and services with precise data responses.
Automated and flexible approach for deploying Windows 10 with security standards set by the DoD.
The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
A tool for securely backing up and versioning production secrets or shared passwords
A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.
Cybersecurity Ventures is a leading research and market intelligence firm providing insights, news, and analysis on the cybersecurity industry.
A honeypot daemon project for processing, filtering, and redirecting incoming traffic to a sandbox environment.
A utility for testing AWS Lambda functions for SQL Injection vulnerabilities using SQLMap attacks.
A forensic tool to find hidden processes and TCP/UDP ports by rootkits or other hidden techniques.
A digital forensic tool for creating forensic images of computer hard drives and analyzing digital evidence.
ClamAV is an open-source antivirus engine that detects trojans, viruses, malware, and other malicious threats.