Comprehensive solutions for securing network infrastructure, traffic, and communications.
Explore 246 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A technique to encode data within DNS queries for covert communication channels.
A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
Fast, smart, effective port scanner with extensive extendability and adaptive learning.
Comprehensive guide for Iptables configuration and firewall rules.
A Fake Protocol Server tool with support for multiple network services and protocols.
Libnids is an implementation of an E-component of Network Intrusion Detection System that emulates the IP stack of Linux 2.0.x and offers IP defragmentation, TCP stream assembly, and TCP port scan detection.
Python module for fast packet parsing with TCP/IP protocol definitions.
A set of interrelated detection rules for improving detection and hunting visibility and context
A technique to associate applications with TLS parameters for identifying malware and vulnerable applications.
Detects the presence of a Responder in the network by sending crafted LLMNR queries.
Tool for setting up Glutton, a cybersecurity tool for monitoring SSH traffic.
An intrusion prevention system for SSH that blocks IP addresses after a set number of consecutive failed login attempts.
A WebSocket Manipulation Proxy with a user interface to capture, intercept, and send custom messages for WebSocket and Socket.IO communications.
Impost is a powerful network security auditing tool with honey pot and packet sniffer capabilities.