PhotoRec View PhotoRec
A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.
Showing 11256 tools • Searched in 3ms
A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.
Tools and documentation for validating hardware security requirements on x86 platforms, including bootable USB key creation and platform configuration verification.
A Docker image with tools for solving Steganography challenges and screening scripts for analyzing files.
Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.
A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.
Script for turning a Raspberry Pi into a Honey Pot Pi with various monitoring and logging capabilities.
Mellivora Mellivora is a PHP-based CTF engine with a wide range of features for managing Capture The Flag competitions.
Kiteworks is a unified platform that secures, tracks, and controls sensitive content communications across email, file sharing, managed file transfer, and web forms to ensure regulatory compliance and data protection.
Boofuzz is a network protocol fuzzing tool that aims to fuzz everything
A file search and query tool for ops and security experts.
A web security tool that scans for vulnerabilities and known attacks.
OCyara performs OCR on image files and scans them for matches to Yara rules, supporting Debian-based Linux distros.
A debugger tool for reverse engineers, crackers, and security analysts, with a user-friendly debugging UI and custom agent support.
Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.
A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
dc3dd is a patch to the GNU dd program, tailored for forensic acquisition with features like hashing and file verification.
High-performance packet capture library with zero copy functionality.
A tool designed to extract additional value from enterprise-wide AppCompat / AmCache data
A super-simple, modern framework for organizing and automating cybersecurity tasks.
Exploit that launches a process on the host from within a Docker container run with the --privileged flag by abusing the Linux cgroup v1 “notification on release” feature.