Security Analysis

Explore 52 curated cybersecurity tools, with 14,858 visitors searching for solutions

Red Hand Analyzer Logo

Red Hand Analyzer is an online tool that provides automated behavioral analysis of PCAP files to detect malicious network activities and security vulnerabilities without decrypting traffic content.

1
BeVigil Enterprise Logo

An attack surface management platform that discovers, maps, and monitors an organization's external digital assets to identify vulnerabilities and security weaknesses before they can be exploited.

0
Cloudflare API Shield Logo

An API security and monitoring platform that automatically discovers, validates, and protects API endpoints while providing comprehensive management and analytics capabilities.

0
Seezo Security Design Reviews Logo

Automated security design review platform for developers

0
Exposing Security Observability Gaps in AWS Native Security Tooling Logo

A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.

0
Oralyzer Logo

A security analysis tool that detects and analyzes open redirection vulnerabilities in web applications.

0
ConventionEngine Logo

ConventionEngine is a Yara rule collection that analyzes PE files by examining PDB paths for suspicious keywords, terms, and anomalies that may indicate malicious software.

0
Access Undenied on AWS Logo

Access Undenied on AWS analyzes CloudTrail AccessDenied events to explain access denial reasons and provide least-privilege remediation suggestions.

0
Conmachi Container Scanner Logo

A Golang-based container security scanner that identifies potential vulnerabilities and misconfigurations in container environments by checking namespacing, capabilities, security profiles, and host device mounts.

0
Boss of the SOC (BOTS) Dataset Version 2 Logo

A security dataset and CTF platform available in full (16.4GB) and attack-only (3.2GB) versions, pre-indexed for Splunk to help security professionals practice analysis skills.

0
LORG Logo

A tool for advanced HTTPD logfile security analysis and forensics, implementing various techniques to detect attacks against web applications.

0
NodeSecure Logo

NodeSecure is a cybersecurity project that provides security monitoring and analysis capabilities specifically designed for Node.js applications.

0
Cloud Reports Logo

A cloud security assessment tool that collects cloud resource information, analyzes it against best practices, and generates compliance reports in multiple formats.

0
Nuvola Logo

A cloud security analysis tool that creates digital twins of AWS environments using graph databases to identify attack paths and security misconfigurations through automated and manual rule-based assessments.

0
RiskInDroid Logo

RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.

0
DECAF++ Logo

DECAF++ is a fast whole-system dynamic taint analysis framework with improved performance and elasticity.

0
Detecting Lateral Movement through Tracking Event Logs (Version 2) Logo

A report on detecting lateral movement through tracking event logs, updated to include analysis of various tools and commands used by attackers.

0
YARA Matches Correspondance Array (YMCA) Logo

Tool for visualizing correspondences between YARA ruleset and samples

0
DroidRA Logo

DroidRA is an instrumentation-based Android security analysis tool that improves the accuracy of reflective call analysis through composite constant propagation techniques.

0
sdc-check Logo

A dependency security analysis tool that identifies potential risks in project dependencies including unsafe lock files, installation scripts, obfuscated code, and dangerous shell commands.

0
aws-summarize-account-activity Logo

A Python tool that analyzes AWS CloudTrail data to summarize IAM principal activities, API calls, regions, IP addresses, and user agents with configurable timeframes and visualization options.

0
go-pillage-registries Logo

A command-line tool that extracts manifest and configuration data from Docker registry images for security analysis and reconnaissance purposes.

0
CFRipper Logo

CFRipper is a security analyzer for AWS CloudFormation templates that identifies vulnerabilities and misconfigurations before cloud deployment.

0
check-my-headers Logo

A Node.js tool that analyzes HTTP security headers on websites to identify missing or problematic security configurations.

0