mem View mem
Windows event log fast forensics timeline generator and threat hunting tool.
Showing 11256 tools • Searched in 3ms
Windows event log fast forensics timeline generator and threat hunting tool.
A tool for collecting and analyzing screenshots from remote desktop protocols, web applications, and VNC connections.
A company that helps organizations create security-aware teams and produce bug-free software.
Repository of tools for testing iPhone messaging by Project Zero
Gitleaks is a SAST tool for detecting and preventing hardcoded secrets in git repos.
Magnet ACQUIRE offers robust data extraction capabilities for digital forensics investigations, supporting a wide range of devices.
Find exposed AWS cloud assets that you did not know you had.
Open source software for leveraging insights from flow and packet analysis to identify potential security threats or attacks.
Maltrail is a malicious traffic detection system utilizing blacklists and heuristic mechanisms.
The Node.js Bug Bounty Program is a program aimed at identifying and fixing security vulnerabilities in the Node.js ecosystem.
A tool for fetching and visualizing cyber threat intelligence data with Elasticsearch and Kibana integration.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
CTF toolkit for rapid exploit development and prototyping.
A vulnerable web application for learning about web application vulnerabilities and writing secure code.
Local pentest lab using docker compose to spin up victim and attacker services.
FOCA is a tool used to find metadata and hidden information in scanned documents, with capabilities to analyze various file types and extract EXIF information.
A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts
Second-order subdomain takeover scanner
Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.
A framework for orchestrating forensic collection, processing, and data export.
Collects and organizes Linux OS data for detailed analysis and incident response.
Comprehensive host-survey tool for security checks in C#.