SeaSponge View SeaSponge
Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.
Showing 11256 tools • Searched in 3ms
Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.
Akamai App & API Protector is an integrated security solution that safeguards web applications and APIs against various cyber threats using edge computing and adaptive technologies.
Airlock Secure Access Hub is an integrated security platform that combines identity and access management with web application and API protection to secure digital applications while maintaining user experience.
Steghide is a steganography program that hides data in image and audio files.
Lists of sources and utilities to hunt, detect, and prevent evildoers.
Performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.
An open-source artifact metadata API for managing metadata about software resources and governing the software supply chain.
A hybrid mobile app for Android that intentionally contains vulnerabilities for testing and education
A shell script for basic forensic collection of various artefacts from UNIX systems.
A script that implements Cognito attacks such as Account Oracle or Priviledge Escalation
APFS is a proprietary file system developed by Apple for macOS, offering improved performance, security, and reliability.
A tool to quickly get all JavaScript sources/files
A module that enforces HTTPS connections and automatically redirects non-encrypted HTTP requests to HTTPS.
A library for forward compatibility with PHP password functions.
Mitigate security concerns of Dependency Confusion supply chain security risks.
Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.
A centralized application security posture management platform that integrates security tools, automates workflows, and provides visibility into application security risks.
A blog about various cybersecurity-related topics, including home networking, compiler development, and security vulnerabilities.
GAUNTLT - Security and Rugged Testing tool
Nmap is an essential network scanning tool used for network security auditing and status monitoring.
Graham Cluley offers expert cybersecurity insights and commentary through various media including podcasts and speaking engagements.
A standard document for software projects
A cheatsheet for understanding privilege escalation with examples, not for enumeration using Linux Commands.