Search Tools
Showing 11254 tools • Searched in 3ms
Kubesploit
A comprehensive .NET post-exploitation library designed for advanced security testing.
Kubernetes Network Policy Recipes
A Fake Protocol Server tool with support for multiple network services and protocols.
Kubernetes Goat
Cybersecurity training platform with courses, certifications, and study guides.
Lab of a Penetration Tester: Week of Evading Microsoft ATA
Collection of URLs for vulnerable web applications and systems for cybersecurity practice.
Kubespot (AWS) AWS EKS Setup for PCI-DSS, SOC2, HIPAA
A CLI utility that makes it easier to switch between different AWS roles
Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory
CLI for generating AWS IAM policy documents, SAM policy templates or SAM Connectors
Lambda-Proxy
A free and open-source tool for identifying vulnerabilities in Joomla-based websites.
Lakera
TrojAI is an AI security platform that detects vulnerabilities in AI models and defends against attacks on AI applications.
Laika BOSS
Open source security-oriented language for describing protocols and applying security policies on captured traffic.
LAMPSecurity Training
The SOC Academy offers official VirusTotal certification courses to help cybersecurity professionals maximize its functionalities and advance their careers.
LavaMoat
NotRuler is a tool for Exchange Admins to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler.
LastActivityView
A Command Line Map-Reduce tool for analyzing cowrie log files over time and creating visualizations and statistics.
LambdaGuard
A cloud native application protection platform that provides unified visibility, risk assessment, and remediation capabilities across multi-cloud and hybrid environments.
LaZagne Project
Self-hosted Fuzzing-As-A-Service platform for continuous developer-driven fuzzing.
LeakedIn.com
Shuffle is a platform for automating security workflows with confidence, offering templates, collaboration tools, and a large app library.
LazyKali
A set of YARA rules for identifying files containing sensitive information
Legion
A guide on using Apache mod_rewrite to strengthen phishing attacks and bypass mobile device restrictions
left-pad.io
A super-simple, modern framework for organizing and automating cybersecurity tasks.