Explore 9 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
NordLayer ZTNA is a Zero Trust Network Access solution that provides identity-based access controls and network segmentation to secure applications and resources regardless of user location.
NordLayer ZTNA is a Zero Trust Network Access solution that provides identity-based access controls and network segmentation to secure applications and resources regardless of user location.
Netskope One Private Access is a Zero Trust Network Access solution that replaces VPNs with secure, context-aware access to private applications and resources.
Netskope One Private Access is a Zero Trust Network Access solution that replaces VPNs with secure, context-aware access to private applications and resources.
SonicWall Cloud Secure Edge is a cloud-native Security Service Edge solution that provides Zero Trust Network Access and secure web gateway capabilities for remote and hybrid workforces.
SonicWall Cloud Secure Edge is a cloud-native Security Service Edge solution that provides Zero Trust Network Access and secure web gateway capabilities for remote and hybrid workforces.
Venn creates secure enclaves on unmanaged BYOD devices using Blue Border™ technology to visually separate and encrypt work applications and data from personal use.
Venn creates secure enclaves on unmanaged BYOD devices using Blue Border™ technology to visually separate and encrypt work applications and data from personal use.
A tool for interacting with Exchange servers remotely and exploiting client-side Outlook features.
A tool for interacting with Exchange servers remotely and exploiting client-side Outlook features.
An open source platform for secure remote access management with granular access control and fast speeds.
An open source platform for secure remote access management with granular access control and fast speeds.
Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.
Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.
Malware allows attackers to execute Windows commands from a remote environment
Malware allows attackers to execute Windows commands from a remote environment
Python tool for remotely or locally dumping RAM of a Linux client for digital forensics analysis.
Python tool for remotely or locally dumping RAM of a Linux client for digital forensics analysis.