SANS View SANS
A guide outlining security considerations for using OpenLDAP Software, including selective listening and IP firewall capabilities.
Showing 11256 tools • Searched in 3ms
A guide outlining security considerations for using OpenLDAP Software, including selective listening and IP firewall capabilities.
A data security and governance platform that provides automated discovery, classification, and protection of sensitive data across cloud, on-premises, and hybrid environments.
A free, open-source tool that uncovers persistently installed software on macOS, helping to generically reveal malware.
A data-driven OT risk management platform that uses digital twin technology and breach simulations to assess cybersecurity risks, optimize mitigation strategies, and ensure compliance with industry standards.
A honeypot agent for running honeypots with service and data at threatwar.com.
Python 3 tool for parsing Yara rules with ongoing development.
A decentralized identity verification solution that enables organizations to issue, manage, and verify digital credentials for user-owned identity scenarios.
Altoro Mutual offers online banking, real estate financing, business credit cards, retirement solutions, and prioritizes privacy and security.
Interactive online malware sandbox for real-time analysis and threat intelligence
An analyzer for parsing GQUIC traffic in Zeek, supporting versions Q039 to Q046, with a fingerprinting method named 'CYU' for detecting anomalous GQUIC traffic.
A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
A high-level C++ library for creating and decoding network packets with a Scapy-like interface.
Anchore Enterprise is a platform that protects and secures software supply chains end-to-end.
Securelist by Kaspersky Lab provides in-depth cybersecurity research and solutions across multiple industries.
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
UDcide provides an alternative approach to dealing with Android malware by targeting specific behaviors for removal.
A framework for managing cyber threat intelligence in structured formats.
A security dataset and CTF platform with full and attack-only versions pre-indexed for Splunk.
An automated code remediation tool that integrates with source control platforms to automatically fix security vulnerabilities in code through AI-driven analysis and one-click implementations.
A cybersecurity and privacy playbook management platform that enables teams to create, store, share, and implement standardized security procedures through a no-code interface.
A tool that discovers all AWS resources created in an account
Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.