Network Access Analyzer
Fast, smart, effective port scanner with extensive extendability and adaptive learning.
Showing 11254 tools • Searched in 5ms
Fast, smart, effective port scanner with extensive extendability and adaptive learning.
Romana automates cloud native network creation and secures applications with a distributed firewall.
LogRhythm NetMon is a network traffic analytics tool that provides real-time visibility, automated threat detection, and investigation capabilities for organizational networks.
A honeypot designed to detect and analyze malicious activities in instant messaging platforms.
A collection of binary tools for various purposes including linking, assembling, profiling, and more.
A cross-platform registry hive editor for forensic analysis with advanced features like hex viewer and reporting engine.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
Load-balancing solution by Microsoft Azure with global infrastructure and financial guidance.
A simple Elasticsearch honeypot to catch attackers exploiting RCE vulnerabilities.
Wfuzz is a tool designed for bruteforcing Web Applications with multiple features like multiple injection points, recursion, and payload combinations.
A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.
A tool to run YARA rules against node_module folders to identify suspicious scripts
A detailed manual for cybersecurity professionals focusing on red team, OSINT, and blue team strategies.
A non-profit organization focused on improving the security of software through resources and training.
A tool for identifying potential security vulnerabilities in dependency configurations by checking for lingering free namespaces for private package names.
A tool for SSH server auditing with comprehensive analysis capabilities.
Open source security data lake for AWS with real-time log normalization and Detection-as-Code capabilities.
Utility for comparing control flow graph signatures to Android methods with scanning capabilities for malicious applications.