This domain is for use in illustrative examples in documents. You may use this domain in literature without prior coordination or asking for permission. More information...
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
SecTor has built a reputation of bringing together experts from around the world to share their latest research and techniques involving underground threats and corporate defences.
A comprehensive collection of resources for learning ARM assembly language and shellcode development.
A tool for SSH server & client configuration auditing with comprehensive analysis and policy scans.
Domain registration and web hosting services with free features and 24/7 customer support
Directory containing components to build labs for Chapter 29 with setup instructions and VM information.
A Node.js Ebook by GENTILHOMME Thomas, covering Node.js development and resources
A library for validating and accessing environment variables in Node.js programs
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.