Kismet
A command line tool for running SQL queries on PCAP files with various output options and a simplistic web-server.
Showing 11254 tools • Searched in 3ms
A command line tool for running SQL queries on PCAP files with various output options and a simplistic web-server.
A lightweight web application firewall that protects modern applications and APIs across distributed architectures with integrated DoS protection, bot defense, and DevOps-friendly deployment options.
A foundational guide for using deception against computer network adversaries using honeypots to detect adversaries before they accomplish their goals.
A demonstration of a method to delete a locked executable or currently running file from disk.
Discontinued project for file-less persistence, attacks, and anti-forensic capabilities on Windows 7 32-bit systems.
A set of utility programs that monitor and control the SMART system built into modern hard drives, providing proactive measures to prevent data loss.
Cloud-based virus scan APIs for securing files, URLs, and content uploads with advanced anti-virus and malware scanning capabilities.
A tool to find and search for registered CVEs, creating a local CVE database for offline use.
Tool for attacking Active Directory environments through SQL Server access.
Cloud Security Suite (cs-suite) - Version 3.0 Usage for cloud security audits on AWS, GCP, Azure, and DigitalOcean.
Krampus is a security solution for managing AWS objects and can be used as a cost-control tool.
A security platform that automates the deployment and management of security canaries across cloud infrastructure to detect potential intrusions and unauthorized access.
A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.
Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
A cloud native application protection platform that provides security monitoring and protection across cloud, on-premises, and hybrid environments.
Rekall is a discontinued project that aimed to improve memory analysis methodology but faced challenges due to the nature of in-memory structure and increasing security measures.