Home / Search

Search Tools

Showing 11256 tools • Searched in 5ms

Infosec/hacking videos recorded by Cooper (@Ministraitor)
Free

Infosec/hacking videos recorded by Cooper (@Ministraitor) View Infosec/hacking videos recorded by Cooper (@Ministraitor)

Free Labs to Train Your Pentest / CTF Skills

InsecureBankv2
Free

InsecureBankv2 View InsecureBankv2

The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.

InQL
Free

InQL View InQL

A self-managed static code analysis platform that conducts continuous inspection of codebases to identify security vulnerabilities, bugs, and code quality issues.

Insider
Free

Insider View Insider

Automatic authorization enforcement detection extension for Burp Suite

InsecureShop
Free

InsecureShop View InsecureShop

A novel genetic algorithm for automating censorship evasion strategies.

InQuest YARA Rules
Free

InQuest YARA Rules View InQuest YARA Rules

A StalkPhish Project YARA repository for Phishing Kits zip files.

InQuest Labs
Free

InQuest Labs View InQuest Labs

Platform for the latest threat intelligence information

InsightAppSec
Free

InsightAppSec View InsightAppSec

A security-focused general purpose memory allocator providing the malloc API with hardening against heap corruption vulnerabilities.

InsightConnect Plugins
Free

InsightConnect Plugins View InsightConnect Plugins

A curated list of known malicious NPM packages

Intel Owl
Free

Intel Owl View Intel Owl

A modular tool for collecting intelligence sources for files and outputting in CSV format.

Intelligence-Driven Incident Response
Free

Intelligence-Driven Incident Response View Intelligence-Driven Incident Response

Connect and learn from experts and peers in the Microsoft Community Hub.

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
Free

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains View Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains

A comprehensive cheat sheet for Windows and Linux terminals and command lines, covering essential commands and syntax for various tasks.

IntelligenceX
Free

IntelligenceX View IntelligenceX

Acapulco is a Splunk application that automatically generates meta-events from hpfeeds channels and visualizes them using D3.js.

Insomniac Security External C2 Framework for Cobalt Strike
Free

Insomniac Security External C2 Framework for Cobalt Strike View Insomniac Security External C2 Framework for Cobalt Strike

A tool that simplifies the installation of tools and configuration for Kali Linux

Inspeckage
Free

Inspeckage View Inspeckage

An open-source project for dynamic analysis of Android applications using the Android Substrate framework.

Inspektor Gadget
Free

Inspektor Gadget View Inspektor Gadget

Automate actions on Security Command Center findings with automated disk snapshots, IAM grant revocation, and more.

Intelligent HoneyNet Dashboard
Free

Intelligent HoneyNet Dashboard View Intelligent HoneyNet Dashboard

A honeypot agent for running honeypots with service and data at threatwar.com.

Internet-Wide Misconfiguration Scanner
Free

Internet-Wide Misconfiguration Scanner View Internet-Wide Misconfiguration Scanner

An automated DDoS vulnerability testing platform that continuously evaluates DDoS protection systems without causing operational downtime.

Intezer Yara Rules
Free

Intezer Yara Rules View Intezer Yara Rules

IDA Pro plugin for finding crypto constants

Intezer
Free

Intezer View Intezer

A tool that generates pseudo-malicious files to trigger YARA rules.

Introspy-Android
Free

Introspy-Android View Introspy-Android

MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.

IntelMQ
Free

IntelMQ View IntelMQ

A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.

InternalBlue
Free

InternalBlue View InternalBlue

A tool for exploiting HTTP/2 cleartext smuggling vulnerabilities

Interlace
Free

Interlace View Interlace

A command-line tool for parsing, creating, and manipulating JWT tokens