Kubeadm View Kubeadm
A CLI tool to simplify the use of AWS Systems Manager Session Manager
Showing 11256 tools • Searched in 3ms
A CLI tool to simplify the use of AWS Systems Manager Session Manager
A comprehensive .NET post-exploitation library designed for advanced security testing.
A Fake Protocol Server tool with support for multiple network services and protocols.
Cybersecurity training platform with courses, certifications, and study guides.
Collection of URLs for vulnerable web applications and systems for cybersecurity practice.
A CLI utility that makes it easier to switch between different AWS roles
ID-spoofing NFS client
CLI for generating AWS IAM policy documents, SAM policy templates or SAM Connectors
A free and open-source tool for identifying vulnerabilities in Joomla-based websites.
Markdown version of OWASP Testing Checklist v4 for various platforms.
A simple Elasticsearch honeypot to catch attackers exploiting RCE vulnerabilities.
TrojAI is an AI security platform that detects vulnerabilities in AI models and defends against attacks on AI applications.
Open source security-oriented language for describing protocols and applying security policies on captured traffic.
The SOC Academy offers official VirusTotal certification courses to help cybersecurity professionals maximize its functionalities and advance their careers.
NotRuler is a tool for Exchange Admins to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler.
A Command Line Map-Reduce tool for analyzing cowrie log files over time and creating visualizations and statistics.
A cloud native application protection platform that provides unified visibility, risk assessment, and remediation capabilities across multi-cloud and hybrid environments.
Self-hosted Fuzzing-As-A-Service platform for continuous developer-driven fuzzing.
Shuffle is a platform for automating security workflows with confidence, offering templates, collaboration tools, and a large app library.
Tool for generating AWS IAM policy statements with a fluent interface.
A set of YARA rules for identifying files containing sensitive information
A guide on using Apache mod_rewrite to strengthen phishing attacks and bypass mobile device restrictions
A super-simple, modern framework for organizing and automating cybersecurity tasks.