A2SV is an open source tool used for scanning SSL vulnerabilities in web applications. A2SV performs vulnerability scanning for CCS injection, Heartbleed,...
Cortex tries to solve a common problem frequently encountered by SOCs, CSIRTs and security researchers in the course of threat intelligence, digital forensics,...
Digital security concept The human element has to be considered when evaluating this type of risk in an organization According to a...
CyberChef is a simple, intuitive web app for carrying out all manner of “cyber” operations within a web browser. These operations include...
Cybersecurity reports reveal the most frequently exploited vulnerabilities Shortly after the launch of its second annual report called “Under the Hoodie: Lessons...
Manticore is a prototyping tool for dynamic binary analysis, with support for symbolic execution, taint analysis, and binary instrumentation. Manticore comes with...
Zebrocy heavily used by the Sednit group over last two years
The most complete open-source tool for Twitter intelligence analysis Introduction tinfoleak is an open-source tool within the OSINT (Open Source Intelligence) and SOCMINT (Social Media Intelligence) disciplines,...
The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in electronic or magnetic...
Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can...
PEframe is an open source tool to perform static analysis on Portable Executable malware and generic suspicious file. It can help malware...
CuckooDroid is an extension of Cuckoo Sandbox the Open Source software for automating analysis of suspicious files. CuckooDroid brigs to cuckoo the...
Apparatus is a security framework to facilitate security analysis in IoT systems. To make the usage of the Apparatus framework easier the...
ShellCheck is a static analysis tool that gives warnings and suggestions for bash/sh shell scripts. How To Use ShellCheck There are a number...
Steganography is an art of hiding messages covert way so that exclusive the sender and recipient know the original message. This technique...
Security analysis and penetration testing is an integral part of creating any kind of secure network. This brings us to the WiFi...
There are plenty of tools for behavioral malware analysis. The defacto standard ones, though, are Sysinternals’s Process Monitor (also known as Procmon)...
Droidefense (originally named atom: analysis through observation machine)* is the codename for android apps/malware analysis/reversing tool. It was built focused on security...
Aletheia is a steganalysis tool for the detection of hidden messages in images. The goal of steganalysis is to identify suspected packages,...
DAMM (Differential Analysis of Malware in Memory) is an open source memory analysis tool built on top of Volatility. It is meant as...
A Sophisticated Ursnif Malware variant using manipulated TLS call back Anti-Analysis Technique while injecting the Child Process for changing the entry point....