iMISP is an Instant Messenger Honeypot designed to detect and analyze malicious activities in instant messaging platforms. It captures and logs chat conversations, files exchanged, and other interactions between the honeypot and the attacker. iMISP is a powerful tool for incident response, threat hunting, and malware analysis. It can be used to detect and analyze various types of attacks, including phishing, malware distribution, and command and control (C2) communication.
Automated signature creation using honeypots for network intrusion detection systems.
Exploiting simple stack overflow vulnerabilities using return oriented programming (ROP) to defeat data execution prevention - DEP.
Azure DDoS Protection and Mitigation Services by Microsoft Azure for secure cloud solutions.
Tool for setting up Glutton, a cybersecurity tool for monitoring SSH traffic.
A Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware with advanced features and Python-based host-side software.
Contains various use cases of Kubernetes Network Policies and sample YAML files.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.