Mystikal
A tool to dump login passwords from Linux desktop users, leveraging cleartext credentials in memory.
Showing 11254 tools • Searched in 3ms
A tool to dump login passwords from Linux desktop users, leveraging cleartext credentials in memory.
WordPress honeypot tool running in a Docker container for monitoring access attempts.
In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.
Automatically redirect users from www to non-www for a secure connection.
A tool for detecting and exploiting Server-Side Template Injection (SSTI) vulnerabilities
AWS Shield provides managed DDoS protection for your applications, automatically detecting and mitigating sophisticated network-level DDoS events.
Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
A tool for extracting IOCs from various input sources and converting them into JSON format.
MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.
An automation platform with community support and documentation for easy development.
A comprehensive guide for hardening GNU/Linux systems with practical step-by-step instructions.
A fast and multi-purpose HTTP toolkit for sending HTTP requests and parsing responses
A tool that checks for hijackable packages in NPM and Python Pypi registries
A Python-based web application scanner for OSINT and fuzzing OWASP vulnerabilities
Receive important notifications and updates related to North American electric grid security.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A collection of free shareable log samples from various systems with evidence of compromise and malicious activity, maintained by Dr. Anton Chuvakin.