Home / Search

Search Tools

Showing 11256 tools • Searched in 6ms

IAM Zero
Free

IAM Zero View IAM Zero

Helm plugin for decrypting encrypted Helm value files on the fly and integrating with cloud native secret managers.

IBM XForce Exchange Checker
Free

IBM XForce Exchange Checker View IBM XForce Exchange Checker

A StalkPhish Project YARA repository for Phishing Kits zip files.

iam-policies-cli
Free

iam-policies-cli View iam-policies-cli

Tool for associating IAM roles to Pods in Kubernetes clusters.

IBM QRadar
Free

IBM QRadar View IBM QRadar

RedELK enhances Red Team operations with SIEM capabilities to monitor and alert on Blue Team activities.

ICSFuzz
Free

ICSFuzz View ICSFuzz

Node library for calling Google Play APIs with Nexus device behavior.

Ice
Free

Ice View Ice

An open-source security tool for AWS, Azure, Google Cloud, and Kubernetes security assessments and audits.

ICS-pcap
Free

ICS-pcap View ICS-pcap

A service for better visibility on networking issues in Kubernetes clusters by detecting traffic denied by iptables.

ICSREF
Free

ICSREF View ICSREF

Explores malware interaction with Windows API and methods for detection and prevention.

ics_mem_collect
Free

ics_mem_collect View ics_mem_collect

Second-order subdomain takeover scanner

IDA_scripts
Free

IDA_scripts View IDA_scripts

angr is a Python 3 library for binary analysis with various capabilities like symbolic execution and decompilation.

IE10Analyzer
Free

IE10Analyzer View IE10Analyzer

A library and tools for accessing and analyzing Linux Logical Volume Manager (LVM) volume system format.

iLEAPP
Free

iLEAPP View iLEAPP

Forensic imaging program with full hash authentication and various acquisition options.

ida_yara
Free

ida_yara View ida_yara

A library for running basic functions from stripped binaries cross platform.

ILSpy
Free

ILSpy View ILSpy

Malware sandbox for executing malicious files in an isolated environment with advanced features.

idb
Free

idb View idb

A guide to bypassing RFID card reader security mechanisms using specialized hardware

Image Steganography Tool
Free

Image Steganography Tool View Image Steganography Tool

Tang is a server for binding data to network presence, providing an easy and secure alternative to key escrow.

ImmuniWeb® MobileSuite
Free

ImmuniWeb® MobileSuite View ImmuniWeb® MobileSuite

Steampipe is a zero-ETL solution for getting data directly from APIs and services.

IMAP-Honey
Free

IMAP-Honey View IMAP-Honey

A tool for bruteforcing subdomains of a given domain

im0rtp3's Yara rule repository
Free

im0rtp3's Yara rule repository View im0rtp3's Yara rule repository

A library of Amazon S3 attack scenarios with mitigation strategies.

ImmuniWeb® On-Demand
Free

ImmuniWeb® On-Demand View ImmuniWeb® On-Demand

DerScanner is a comprehensive application security testing platform that combines SAST, DAST, MAST, SCA, and Binary Analysis capabilities with support for on-premises deployment and CI/CD integration.

imobax
Free

imobax View imobax

A script for extracting common Windows artifacts from source images and VSCs with detailed dependencies and usage instructions.

iMISP
Free

iMISP View iMISP

A tool for exploiting HTTP/2 cleartext smuggling vulnerabilities

imagemounter
Free

imagemounter View imagemounter

A tool with advanced filtering capabilities for analyzing events based on time, path, weekday, and date.

Impacket
Free

Impacket View Impacket

DOS attack by sending fake BPDUs to disrupt switches' STP engines.