Imperva API Security
SafeLine WAF is an open-source web application firewall that protects web services by filtering malicious HTTP traffic through intelligent semantic analysis and machine learning-based detection.
Showing 11254 tools • Searched in 5ms
SafeLine WAF is an open-source web application firewall that protects web services by filtering malicious HTTP traffic through intelligent semantic analysis and machine learning-based detection.
WPRecon is a tool for recognizing vulnerabilities and blackbox information for WordPress.
The Cloudflare Learning Center provides educational resources covering various cybersecurity and internet-related topics, including DDoS attacks, CDNs, DNS, web application security, serverless computing, encryption protocols, bots, cloud computing, Zero Trust security, SASE, networking, data privacy, video streaming, email security, and AI.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
Java MODBUS simulator with scriptable functions and dynamic resource creation.
Project hosting scripts for implementing Pass the Hash mitigations with PtHTools module commands.
Weaponizing Kerberos protocol flaws for stealthy attacks on domain users.
Online hacking game with realistic hacking experience and player interaction.
Collection of scripts and resources for DevSecOps, Security Automation and Automated Incident Response Remediation.
replayproxy allows you to 're-live' a HTTP session captured in a .pcap file, parsing HTTP streams, caching them, and starting a HTTP proxy to reply to requests with matching responses.
Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.
A tool that simplifies the installation of tools and configuration for Kali Linux
Sysreptor offers a customizable reporting solution for penetration testing and red teaming activities.
Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
Security cheatsheets to aid penetration testers and security enthusiasts in remembering useful but not frequently used commands.
F-Secure Blog provides in-depth articles and research on cybersecurity threats and best practices.
Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.
A structured approach for conducting penetration tests with seven main sections covering all aspects of the test.
C3 is a framework for creating custom C2 channels, integrating with existing offensive toolkits.
Romana automates cloud native network creation and secures applications with a distributed firewall.