Comprehensive solutions for securing network infrastructure, traffic, and communications.
Explore 245 curated tools and resources
Open source security-oriented language for describing protocols and applying security policies on captured traffic.
Object scanning system with scalable and flexible architecture for intrusion detection.
A Yara scanner for IMAP feeds and saved streams, extracting attachments and scanning them with chosen Yara rule files.
replayproxy allows you to 're-live' a HTTP session captured in a .pcap file, parsing HTTP streams, caching them, and starting a HTTP proxy to reply to requests with matching responses.
Smart traffic sniffing tool for penetration testers
A command line tool for running SQL queries on PCAP files with various output options and a simplistic web-server.
Simple perl script for making Modbus transactions from the command line.
Visualize and analyze network relationships with AfterGlow
6Guard is an IPv6 attack detector sponsored by Google Summer of Code 2012 and supported by The Honeynet Project organization.
A honeypot that logs NTP packets into a Redis database to detect DDoS attempts.
Fake SSH server that sends push notifications for login attempts
A tool for parsing Google Protobuf encoded blobs without the accompanying definition, providing a colored representation of the contents.
JARM is a TLS server fingerprinting tool used for identifying server configurations and malicious infrastructure.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.