Chkrootkit is a tool to locally check for signs of a rootkit, including checking system binaries for rootkit modification, interface promiscuous mode, lastlog and wtmp deletions, LKM trojans, strings replacement, and more. It has been recognized as one of the Top 10 Tools to Scan Linux Servers for Vulnerability and Malware by Cyber Security News, with continuous updates and bug fixes for over 25 years.
Boomerang Decompiler is a machine code decompiler supporting various architectures and file formats, with a focus on high-level language output.
A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.
Tools for working with Android .dex and Java .class files, including dex-reader/writer, d2j-dex2jar, and smali/baksmali.
A tool for reading Portable Executable (PE) files with detailed information about the file structure.
A collection of Yara signatures for identifying malware and other threats
A library and command line interface for extracting URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules from text corpora.
A payload creation framework for the retrieval and execution of arbitrary CSharp source code.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.