The Phishing Intelligence Engine (PIE) is an Active Defense framework that continuously evaluates Office 365 Message Trace logs for malicious contents, uses RegEx and Threat Feed correlation to determine email risk, automatically responds to attacks, and integrates with Dynamic Case Management for metrics tracking and email security verification. Note: This framework is not officially supported by LogRhythm.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Alternative marketplace for mobile applications with package ID metadata retrieval and APK download capabilities.
PLCinject is a tool for injecting and patching blocks on PLCs with a call instruction.
Android security virtual machine with updated tools and frameworks for reverse engineering and malware analysis.
Verify scripts and executables to mitigate chain of supply attacks.
Innovative tool for mobile security researchers to analyze targets with static and dynamic analysis capabilities and sharing functionalities.
Python tool for monitoring user-select APIs in Android apps using Frida.
DroidBox is a tool for dynamic analysis of Android applications, providing insights into package behavior and security.
Repository for apps to be used in Shuffle with compatibility instructions.
A tool for analyzing Android applications in local storage with various functionalities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.