Penetration Testing Execution Standard (PTES) View Penetration Testing Execution Standard (PTES)
CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.
Showing 11256 tools • Searched in 3ms
CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.
A blog post discussing the often overlooked dangers of CSV injection in applications.
A tool that visits suspected phishing pages, takes screenshots, and extracts interesting files.
Easy-to-use live forensics toolbox for Linux endpoints with various capabilities such as process inspection, memory analysis, and YARA scanning.
A C/C++ tool for remote process injection, supporting x64 and x86 operations, with system call macros generated by SysWhispers script.
Phrack Magazine is a digital magazine that focuses on computer security and hacking, featuring articles, interviews, and tutorials on various topics related to computer security.
Inceptor is a template-driven framework for evading Anti-Virus and Endpoint Detection and Response solutions, allowing users to create custom evasion techniques and test their security controls.
A web-based manager for Yara rules, allowing for storage, editing, and management of Yara rules.
A tool for interacting with the MSBuild API, enabling malicious activities and evading detection.
A utility tool for decrypting data from weak public keys and attempting to recover the corresponding private key, primarily for educational purposes.
A security tool to identify interesting files in AWS S3 buckets
6Guard is an IPv6 attack detector sponsored by Google Summer of Code 2012 and supported by The Honeynet Project organization.
Open-source project for building instrumented environments to simulate attacks and test detections.
A honeypot designed to detect and analyze malicious activities in instant messaging platforms.
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
A Yara scanner for IMAP feeds and saved streams, extracting attachments and scanning them with chosen Yara rule files.
A TCP-based traceroute implementation that bypasses firewall filters to trace the path to a destination.
A platform that provides visibility and security monitoring of hardware, firmware, and software components in IT infrastructure to identify supply chain risks and vulnerabilities.
A Low-cost ICS Security Testbed for Education and Research
Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.
A modular malware collection and processing framework with support for various threat intelligence feeds.
Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.
A command-line tool that scans NPM packages and ZIP files to detect exposed secrets and sensitive credentials in source code and configuration files.