Json

Explore 22 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Rogueapps Logo

A collaborative repository documenting TTPs and attack patterns associated with malicious OIDC/OAuth 2.0 applications.

0
FastIR Collector Logo

Tool for live forensics acquisition on Windows systems, collecting artefacts for early compromise detection.

0
Krampus Logo

Krampus is an AWS resource management tool that automates the deletion and disabling of cloud objects based on JSON task files for security remediation and cost control.

0
OTE Logo

A powerful OSINT tool for creating custom templates for data extraction and analysis

0
AWS List Resources Logo

A Python tool that uses AWS Cloud Control API to enumerate and catalog AWS resources across specified accounts and regions, outputting results in JSON format.

0
GitMiner Logo

A powerful tool for searching and scraping data from GitHub

0
Heralding Logo

A simple honeypot that collects credentials across various protocols

0
AndroPyTool Logo

A tool for extracting static and dynamic features from Android APKs.

0
Clevis Logo

Clevis is a pluggable framework that enables automated decryption of data and LUKS volumes through a pin-based plugin system.

0
@hapi/bourne Logo

JSON.parse() drop-in replacement with prototype poisoning protection.

0
Hooker Logo

An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.

0
usbrip Logo

A command-line forensics tool for tracking and analyzing USB device artifacts and connection history on Linux systems.

0
Syrup Logo

Syrup is a Go-based SSH honeypot that simulates SSH services with fake shells, session recording, and comprehensive logging to monitor and analyze unauthorized access attempts.

0
drydock Logo

A Python-based Docker security audit tool that performs CIS benchmark assessments with customizable profiles and JSON reporting capabilities.

0
go-audit Logo

An alternative to the auditd daemon with goals of safety, speed, JSON output, and pluggable pipelines connecting to the Linux kernel via netlink.

0
Open Cybersecurity Schema Framework Logo

A framework for creating standardized cybersecurity event schemas in JSON format that enables interoperability across security tools and platforms.

0
SOPS Logo

SOPS is an encrypted file editor that supports multiple formats and integrates with various key management services including AWS KMS, GCP KMS, Azure Key Vault, age, and PGP.

0
secure-json-parse Logo

A tool to prevent prototype poisoning in JSON parsing.

0
AWS Recon Logo

A multi-threaded Ruby tool for comprehensive AWS security inventory collection that gathers detailed resource attributes, metadata, and policy information across AWS environments.

0
hpfeeds Logo

hpfeeds is a lightweight authenticated publish-subscribe protocol with Python 3 compatible broker and client.

0
Joy Logo

A package for capturing and analyzing network flow data and intraflow data.

0
Potiron Logo

Normalize, index, enrich, and visualize network capture data using Potiron.

0