RegRipper 3.0 View RegRipper 3.0
Forensic imaging program with full hash authentication and various acquisition options.
Showing 11256 tools • Searched in 3ms
Forensic imaging program with full hash authentication and various acquisition options.
Network Dump data Displayer and Editor framework for tcpdump trace files manipulation.
Full-featured C2 framework for stealthy communication and control on web servers.
A leading online publication providing news, analysis, and insights on cybersecurity, IT leadership, and technology trends.
A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.
Open-source cloud-agnostic resource manager for analyzing and managing cloud cost, usage, security, and governance.
SecGen creates vulnerable virtual machines and hacking challenges for learning security penetration testing techniques.
Automated contextual security findings enrichment and impact evaluation tool for vulnerability management.
A method for log volume reduction without losing analytical capability.
A standalone binary inspection tool for Android developers with support for various formats and dependencies.
SAST and malware analysis tool for Android APKs with detailed scan information.
A framework for testing and exploiting race conditions in software
Collection of slides, materials, demos, crackmes, and writeups from r2con-2017 conference.
A better version of my xssfinder tool that scans for different types of XSS on a list of URLs.
DNSDumpster is a domain research tool for discovering and analyzing DNS records to map an organization's attack surface.
A curated list of open-source projects containing protestware sourced from various platforms.
NodeGoat provides an environment to learn and address OWASP Top 10 security risks in Node.js web applications.
A tool that scans a corpus of malware and builds a YARA rule to detect similar code sections.
A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.
An API security and monitoring platform that automatically discovers, validates, and protects API endpoints while providing comprehensive management and analytics capabilities.
A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.
A powerful tool for analyzing and visualizing system activity timelines.
Request Tracker for Incident Response (RTIR) is a tool for incident response teams to manage incident reports, correlate data, and facilitate communication.