Home / Search

Search Tools

Showing 11256 tools • Searched in 3ms

Penetration Testing Execution Standard (PTES)
Free

Penetration Testing Execution Standard (PTES) View Penetration Testing Execution Standard (PTES)

CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.

Penetration Testing Practice Lab - Vulnerable Apps/Systems
Free

Penetration Testing Practice Lab - Vulnerable Apps/Systems View Penetration Testing Practice Lab - Vulnerable Apps/Systems

A blog post discussing the often overlooked dangers of CSV injection in applications.

Penetration Testing Practice Profile
Free

Penetration Testing Practice Profile View Penetration Testing Practice Profile

A tool that visits suspected phishing pages, takes screenshots, and extracts interesting files.

Penguin OS Forensic (or Flight) Recorder (POFR)
Free

Penguin OS Forensic (or Flight) Recorder (POFR) View Penguin OS Forensic (or Flight) Recorder (POFR)

Easy-to-use live forensics toolbox for Linux endpoints with various capabilities such as process inspection, memory analysis, and YARA scanning.

Pentoo Linux
Free

Pentoo Linux View Pentoo Linux

A C/C++ tool for remote process injection, supporting x64 and x86 operations, with system call macros generated by SysWhispers script.

PEzor
Free

PEzor View PEzor

Phrack Magazine is a digital magazine that focuses on computer security and hacking, featuring articles, interviews, and tutorials on various topics related to computer security.

Pentest Lab
Free

Pentest Lab View Pentest Lab

Inceptor is a template-driven framework for evading Anti-Virus and Endpoint Detection and Response solutions, allowing users to create custom evasion techniques and test their security controls.

PEview
Free

PEview View PEview

A web-based manager for Yara rules, allowing for storage, editing, and management of Yara rules.

Permiso
Free

Permiso View Permiso

CredStash is a tool for managing and securely storing credentials.

PETEP (PEnetration TEsting Proxy)
Free

PETEP (PEnetration TEsting Proxy) View PETEP (PEnetration TEsting Proxy)

A tool for interacting with the MSBuild API, enabling malicious activities and evading detection.

Permanent-Eraser
Free

Permanent-Eraser View Permanent-Eraser

A utility tool for decrypting data from weak public keys and attempting to recover the corresponding private key, primarily for educational purposes.

Perimeterator
Free

Perimeterator View Perimeterator

A security tool to identify interesting files in AWS S3 buckets

PFQ v6.2
Free

PFQ v6.2 View PFQ v6.2

6Guard is an IPv6 attack detector sponsored by Google Summer of Code 2012 and supported by The Honeynet Project organization.

PenTesters Framework (PTF)
Free

PenTesters Framework (PTF) View PenTesters Framework (PTF)

Open-source project for building instrumented environments to simulate attacks and test detections.

PF_RING ZC (Zero Copy)
Free

PF_RING ZC (Zero Copy) View PF_RING ZC (Zero Copy)

A honeypot designed to detect and analyze malicious activities in instant messaging platforms.

pghoney
Free

pghoney View pghoney

Honey-Pod for SSH that logs username and password tries during brute-force attacks.

PFSense
Free

PFSense View PFSense

A Yara scanner for IMAP feeds and saved streams, extracting attachments and scanning them with chosen Yara rule files.

PF_RING
Free

PF_RING View PF_RING

A TCP-based traceroute implementation that bypasses firewall filters to trace the path to a destination.

Phish Report
Free

Phish Report View Phish Report

A platform that provides visibility and security monitoring of hardware, firmware, and software components in IT infrastructure to identify supply chain risks and vulnerabilities.

Phishing Catcher
Free

Phishing Catcher View Phishing Catcher

A Low-cost ICS Security Testbed for Education and Research

Phantom Threat Inteliigence
Free

Phantom Threat Inteliigence View Phantom Threat Inteliigence

Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.

PhishingKit-Yara-Rules
Free

PhishingKit-Yara-Rules View PhishingKit-Yara-Rules

A modular malware collection and processing framework with support for various threat intelligence feeds.

Phoenix
Free

Phoenix View Phoenix

Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.

PhoneyC
Free

PhoneyC View PhoneyC

A command-line tool that scans NPM packages and ZIP files to detect exposed secrets and sensitive credentials in source code and configuration files.