Plyara View Plyara
A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.
Showing 11256 tools • Searched in 3ms
A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.
Web-based tool for browsing mobile applications sandbox and previewing SQLite databases.
A ruby script that scans for vulnerable 3rd-party web applications
GuardDog is a CLI tool for identifying malicious PyPI and npm packages through heuristics and Semgrep rules.
Repository documenting common techniques to bypass AppLocker with verified, unverified, and generic bypasses.
IDA Pro plugin for finding crypto constants
A nonprofit security organization that collects and shares threat data to make the Internet more secure.
A SaaS-based web application firewall that combines signature and behavioral-based threat detection to protect applications deployed across cloud, on-premises and edge environments.
A module that enforces HTTPS connections and automatically redirects non-encrypted HTTP requests to HTTPS.
Platform for users to test cybersecurity skills by exploiting vulnerabilities.
MISP is an open source threat intelligence platform that enhances threat information sharing and analysis.
Automated and flexible approach for deploying Windows 10 with security standards set by the DoD.
Hide data in images while maintaining perceptual similarity and extract it from printed and photographed images.
Collection of scripts and resources for DevSecOps, Security Automation and Automated Incident Response Remediation.
A Mac OS X computer forensics tool for analyzing system artifacts, user files, and logs with reputation verification and log aggregation capabilities.
A comprehensive cheat sheet for accessing Windows systems from Linux hosts using smbclient and rpcclient tools, covering password management, user and group enumeration, and more.
An API for constructing and injecting network packets with additional functionality.
Safely store secrets in version control repositories with GPG encryption support.
Emulates Docker HTTP API with event logging and AWS deployment script.