This tool launches attack on k8s cluster from within. That means you already need to have an access with permission to...
Anteater is an open framework to prevent the unwanted merging of nominated strings, filenames, binaries, depreciated functions, staging enviroment code /...
Grapl is an open source platform for Detection and Response (D&R). The position that Grapl takes is that Graphs provide a...
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of...
Scout2 is a security tool that lets AWS administrators assess their environment’s security posture. Using the AWS API, Scout2 gathers configuration data...
GlobaLeaks is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives developed by the Hermes Center for Transparency and Digital Human...
Grouper is a slightly wobbly PowerShell module designed for pentesters and redteamers (although probably also useful for sysadmins) which sifts through the...
Sigma is a generic and open signature format that allows you to describe relevant log events in a straight forward manner. The...
Linux System Optimizer And Monitoring. Required Packages curl systemd Debian x64 Download stacer_1.0.8_amd64.deb from the Stacer releases page. Run sudo dpkg -i...
CS Suite is a one stop tool for auditing the security posture of the AWS infrastructure and does system audits as well....
The Automated Collection and Enrichment (ACE) platform is a suite of tools for threat hunters to collect data from many endpoints in...
The PowerUpSQL module includes functions that support SQL Server discovery, auditing for common weak configurations, and privilege escalation on scale. It is...
Quasar is a fast and light-weight remote administration tool coded in C#. Providing high stability and an easy-to-use user interface, Quasar is...
ProcDump is a Linux reimagining of the classic ProcDump tool from the Sysinternals suite of tools for Windows. ProcDump provides a convenient...
CALDERA is an automated adversary emulation system that performs post-compromise adversarial behavior within enterprise networks. It generates plans during operation using a planning...
Prochunter aims to find hidden process with all userspace and most of the kernelspace rootkits. This tool is composed of a kernel...
Diamorphine is a LKM rootkit for Linux Kernels 2.6.x/3.x/4.x Features When loaded, the module starts invisible; Hide/unhide any process by sending a...