Mirai Tracker
Sigma is a generic and open signature format for SIEM systems and other security tools to detect and respond to threats.
Showing 11254 tools • Searched in 3ms
Sigma is a generic and open signature format for SIEM systems and other security tools to detect and respond to threats.
An open-source framework for testing and validating the security of AWS services and resources.
Docker-based honeypot setup with detailed installation and configuration instructions.
A database of Tor exit nodes with their corresponding IP addresses and timestamps.
PolySwarm is a malware intelligence marketplace that aggregates threat detection engines to provide early detection, unique samples, and higher accuracy.
A list of most queried domains based on passive DNS usage across the Umbrella global network.
Tools to export data from MISP MySQL database for post-incident analysis and correlation.
Zeek Remote desktop fingerprinting script for fingerprinting Remote Desktop clients.
Cilium is a networking, observability, and security solution with an eBPF-based dataplane.
Chameleon aids in evading proxy categorization to bypass internet filters.
Tool used to scan a range of IP addresses to identify active hosts and gather information about them.
Intentionally vulnerable Kubernetes cluster environment for learning and practicing Kubernetes security.
SecurityVulnerability.io simplifies the process of collecting, enriching, and presenting vulnerability information for both human and machine consumption.
A CLI utility that makes it easier to switch between different AWS roles
ICSREF is a modular framework for automated reverse engineering of industrial control systems binaries
HxD is a freeware hex editor and disk editor with advanced features for editing files, memory, and disks.
Collection of cybersecurity conference videos recorded by Cooper (@Ministraitor)
An AI-powered API security testing platform that performs continuous vulnerability assessment, attack surface mapping, and compliance monitoring of API endpoints.
RDP based Honeypot that creates virtual machines for incoming connections and analyzes traffic with Suricata.
A software supply chain security platform that analyzes binaries and software components to detect malware, vulnerabilities, exposed secrets, and tampering throughout the development lifecycle.
A framework for generating log events without the need for infrastructure, allowing for simple, repeatable, and randomized log event creation.
Exhaustive checklist for securing Node.js web services with a focus on error handling and custom error pages.
A modular, menu-driven tool for building repeatable, time-delayed, distributed security events.