Convolutional neural network for analyzing pentest screenshots This tool uses a convolutional neural network to analyze pentest screenshots and identify potential security vulnerabilities.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A reverse engineering tool that extracts and organizes Samsung ODIN3 protocol messages from USB packet captures into human-readable files.
Toolkit for performing acquisitions on iOS devices with logical and filesystem acquisition support.
A collection of Mac OS X and iOS forensics resources with a focus on artifact collection and collaboration.
A modified version of GNU dd with added features like hashing and fast disk wiping.
LiME is a Linux Memory Extractor tool for acquiring volatile memory from Linux and Linux-based devices, including Android, with features like full memory captures and minimal process footprint.
Exiv2 is a C++ library and command-line utility for image metadata manipulation.
A free, open-source file data recovery software that can recover lost files from hard disks, CD-ROMs, and digital camera memory.
A cross-platform registry hive editor for forensic analysis with advanced features like hex viewer and reporting engine.
Anti-forensics tool for Red Teamers to erase footprints and test incident response capabilities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.