One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password
FEATURES
SIMILAR TOOLS
YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.
A PowerShell module for interacting with VirusTotal to analyze suspicious files and URLs.
GuardDog is a CLI tool for identifying malicious PyPI and npm packages through heuristics and Semgrep rules.
A tool to help exploit XXE vulnerabilities by sending a crafted XML file to the server and parsing it to extract the data.
A simple XSS scanner tool for identifying Cross-Site Scripting vulnerabilities
Krakatau provides an assembler and disassembler for Java bytecode, supporting conversion, creation, examination, comparison, and decompilation of Java binaries.
A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.
PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.