Home / Search

Search Tools

Showing 11255 tools • Searched in 4ms

Apktool
Free

Apktool View Apktool

Binwalk is a tool for analyzing, reverse engineering, and extracting firmware images with security and Python 2.7 deprecation notices.

Appland Downloader
Free

Appland Downloader View Appland Downloader

A comprehensive collection of resources for learning ARM assembly language and shellcode development.

App Detonator
Free

App Detonator View App Detonator

A tool to profile web applications based on response time discrepancies.

AppCompatProcessor
Free

AppCompatProcessor View AppCompatProcessor

Scan files or process memory for Cobalt Strike beacons and parse their configuration.

Apple Silicon Mac Security Guide
Free

Apple Silicon Mac Security Guide View Apple Silicon Mac Security Guide

A documentation template library for implementing industrial information security management systems.

AppTrana
Free

AppTrana View AppTrana

Static code analyzer for Infrastructure as Code with 500+ security policies and support for various IaC tools and cloud platforms.

Applied Crypto Hardening: bettercrypto.org
Free

Applied Crypto Hardening: bettercrypto.org View Applied Crypto Hardening: bettercrypto.org

A collection of writeups of CTF challenges I solved, including explanations of the challenges and how I solved them.

Application Gateway
Free

Application Gateway View Application Gateway

Comprehensive guide for Iptables configuration and firewall rules.

Applied Incident Response
Free

Applied Incident Response View Applied Incident Response

Teaching Security provides educational resources and lessons for teaching cybersecurity concepts to high school students.

AppLocker Guidance
Free

AppLocker Guidance View AppLocker Guidance

MetaDefender Cloud offers advanced threat prevention using technologies like Multiscanning, Deep CDR, and Sandbox.

appNovi
Free

appNovi View appNovi

Panorays is a third-party cyber risk management platform that combines external attack surface monitoring with automated security questionnaires to assess, remediate, and continuously monitor vendor security postures.

AppMon
Free

AppMon View AppMon

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

AppUse
Free

AppUse View AppUse

A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

AppSweep
Free

AppSweep View AppSweep

A cloud-based DAST solution that discovers, inventories, and tests web applications and APIs for security vulnerabilities across diverse environments.

APT & Cybercriminals Campaign Collection
Free

APT & Cybercriminals Campaign Collection View APT & Cybercriminals Campaign Collection

Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.

APT-Hunter
Free

APT-Hunter View APT-Hunter

ONYPHE is a cyber defense search engine that discovers exposed assets and provides real-time monitoring to identify vulnerabilities and potential risks.

APT Notes
Free

APT Notes View APT Notes

Automatically curate open-source Yara rules and run scans with YAYA.

APT Groups and Operations
Free

APT Groups and Operations View APT Groups and Operations

A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.

APT Simulator
Free

APT Simulator View APT Simulator

An interactive multi-user web JS shell

aquatone
Free

aquatone View aquatone

A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.

Aptoide
Free

Aptoide View Aptoide

Detect and warn about potential malicious behaviors in Android applications through static analysis.

Arachni
Free

Arachni View Arachni

An open-source modern Dependency Walker for Windows developers.

Arctic Swallow
Free

Arctic Swallow View Arctic Swallow

Hived is a honeypot tool for deceiving attackers and gathering information.