Cyber Research Wiki

Pocket atlas companion

Cyber Research Wiki

A generated encyclopedia of cybersecurity tools, built from the same source pipeline as the Pocket Atlas app and published as a static GitHub Pages site.

2069 wiki entries Generated from a shared tool pipeline
unknown confidence

700 Integrations

unknown confidence

Aaronlocker

unknown confidence

Abuse Ch

unknown confidence

Abuseipdb

unknown confidence

Ac Hunter

unknown confidence

Access Certifications

unknown confidence

Access Context Manager

unknown confidence

Access Control

unknown confidence

Access For Infrastructure

unknown confidence

Access Governance

unknown confidence

Access Levels

unknown confidence

Access Metrics

unknown confidence

Access Reviews

unknown confidence

Acls

unknown confidence

Actionlint

unknown confidence

Activity Log

unknown confidence

Adaptive Shield

unknown confidence

Adb

unknown confidence

Admincount

unknown confidence

Aff

unknown confidence

Afl

unknown confidence

Agent

unknown confidence

Ai

unknown confidence

Aide

unknown confidence

Aircrack Ng And Related Tools

high confidence

Aircrack-ng Suite

A collection of command-line tools for monitoring, testing, and auditing Wi‑Fi networks, including packet capture, frame injection, and offline key recovery for WEP and WPA/WPA2‑PSK.

unknown confidence

Aireplay Ng

unknown confidence

Akamai Guardicore Segmentation

unknown confidence

Akto

unknown confidence

Alb

unknown confidence

Aleapp

unknown confidence

Alienvault Otx

unknown confidence

Allows Message Modification And Replay

unknown confidence

Allstar

unknown confidence

Altair Graphql Client

high confidence

OWASP Amass

OWASP Amass is a framework for mapping internet-exposed assets and attack surfaces using OSINT and optional active reconnaissance, correlating results into a unified asset graph for analysis and tracking.

unknown confidence

Amazon Athena

unknown confidence

Amazon Detective

unknown confidence

Amazon Eventbridge

unknown confidence

Amazon Guardduty

unknown confidence

Amazon Macie

unknown confidence

Amazon Security Lake

unknown confidence

Amcacheparser

unknown confidence

Amsi

unknown confidence

Analyzemft

unknown confidence

Analyzing

unknown confidence

And 802 1q Attacks With Both Gui And Cli Modes

unknown confidence

And Abuseipdb

unknown confidence

And Access Policies

unknown confidence

And Adaptive Access Policies

unknown confidence

And Air Gapped Recovery

unknown confidence

And Aircrack Ng

unknown confidence

And Allowed Requests

unknown confidence

And Analyzing Embedded File Systems And Compressed Data In Firmware Images

unknown confidence

And Analyzing Embedded Firmware Images

unknown confidence

And Anomaly Detection For Industrial Environments

unknown confidence

And API Activity

unknown confidence

And API Analytics

unknown confidence

And API Discovery

unknown confidence

And Application Access Management

unknown confidence

And Appsync Endpoints

unknown confidence

And Appsync

unknown confidence

And Aql Query Engine

unknown confidence

And Ascii Modes Used For Building Custom Modbus Clients

unknown confidence

And Attaching Attestations Using Sigstore Keyless Signing Or Traditional Key Based Signing

unknown confidence

And Attack Generation With Support For Schema Brute Forcing

unknown confidence

And Attesting Container Images With Key Based Or Keyless Workflows

unknown confidence

And Audit Logs

unknown confidence

And Authentication

unknown confidence

And Automated Extraction Of Embedded Files

unknown confidence

And Automated Provisioning

unknown confidence

And Automated Recovery Orchestration

unknown confidence

And Automating Scope Reviews

unknown confidence

And Azure Ad Integration

unknown confidence

And Bacnet Protocol Analyzers For Baseline Building

unknown confidence

And Bacnet

unknown confidence

And Banner Information For Ip Enrichment

unknown confidence

And Beacon Detection Queries

unknown confidence

And Biometrics For Ot Access Verification

unknown confidence

And Breakpoint Capabilities

unknown confidence

And Campaign Analysis

unknown confidence

And Campaign Linkages

unknown confidence

And Canary Tokens

unknown confidence

And Canvas For Security Dashboards

unknown confidence

And Case Management

unknown confidence

And Certificate Detail Retrieval

unknown confidence

And Certificate Transparency Log Analysis

unknown confidence

And Certificate Validation

unknown confidence

And Characteristic Read

unknown confidence

And Ci

unknown confidence

And Cloud Configurations

unknown confidence

And Cloud Infrastructure Assessment

unknown confidence

And Cloud Modules

unknown confidence

And Cloud Storage

unknown confidence

And Code Analysis

unknown confidence

And Collaborative War Room

unknown confidence

And Command Execution Across Windows Networks

unknown confidence

And Command Injection

unknown confidence

And Community Comments

unknown confidence

And Comparing Module Guids

unknown confidence

And Comparing Responses Across Authentication Contexts

unknown confidence

And Compiler Information

unknown confidence

And Compliance Checks

unknown confidence

And Compliance Monitoring

unknown confidence

And Compliance Reporting

unknown confidence

And Compliance Scoring

unknown confidence

And Connection Logs For Lateral Movement Analysis

unknown confidence

And Connector Configuration

unknown confidence

And Content Analysis

unknown confidence

And Content Search

unknown confidence

And Continuous Threat Detection Platform

unknown confidence

And Converting Between Capture File Formats

unknown confidence

And Counted Requests

unknown confidence

And Coverage Over Time

unknown confidence

And Credential Capture

unknown confidence

And Credential Sniffing With A Modular Architecture

unknown confidence

And Credential Sniffing

unknown confidence

And Credentials From Pcap Files

unknown confidence

And Custom Rule Sources

unknown confidence

And Custom Workflows

unknown confidence

And Dashboard

unknown confidence

And Data Access Opportunities

unknown confidence

And Data Exfiltration

unknown confidence

And Data Source Integration

unknown confidence

And Debugger Supporting C And Vb Net Decompilation

unknown confidence

And Dependency Review In Github

unknown confidence

And Deploys Rulesets With Policy Based Filtering

unknown confidence

And Detailed Analytics

unknown confidence

And Detecting Suspicious Keywords And Iocs

unknown confidence

And Device Compromise

unknown confidence

And Device Registration

unknown confidence

And Distributing Iocs

unknown confidence

And Distribution Info

unknown confidence

And Distribution

unknown confidence

And Dlp Policy Enforcement

unknown confidence

And DNS Databases

unknown confidence

And DNS Tokens

unknown confidence

And Dockerfile

unknown confidence

And Documenting Apis With Built In Scripting And Collection Management

unknown confidence

And Dom Content When Triggered

unknown confidence

And Domain Analysis With 70 Av Engines

unknown confidence

And Driver Analysis Plugins For Kernel Rootkit Detection

unknown confidence

And Drivers

unknown confidence

And Dynamic Credential Generation

unknown confidence

And Dynamic Vlan Assignment

unknown confidence

And Elastic

unknown confidence

And Elements Tabs For Tracing Dom Based Xss Data Flows And Testing Payloads In Real Time

unknown confidence

And Embedded Data Within Firmware Images

unknown confidence

And Encryption Info

unknown confidence

And Encryption Settings

unknown confidence

And Endpoint Verification

unknown confidence

And Entitlement Management

unknown confidence

And Ethernet

unknown confidence

And Evaluating Exercises

unknown confidence

And Evil Twin Deployment

unknown confidence

And Exception Responses

unknown confidence

And Export Capabilities

unknown confidence

And Exporting Specific Fields For Analysis

unknown confidence

And Extracting Audit Data

unknown confidence

And Extracting San Lists From Certificates Retrieved Through Ct Monitoring

unknown confidence

And File Activity Logging

unknown confidence

And File Change Telemetry Ingested Into Splunk

unknown confidence

And File Read

unknown confidence

And File Telemetry

unknown confidence

And Fileless Malware Artifacts

unknown confidence

And Flood Tools

unknown confidence

And Formatting Iocs

unknown confidence

And Frida Discover

unknown confidence

And Function Url Authorization Types

unknown confidence

And GCP

unknown confidence

And Generating Adoption Reports

unknown confidence

And Generating Compliance Evidence

unknown confidence

And Generation Of Resources Based On Security Policies

unknown confidence

And Geographic Attributes

unknown confidence

And Geographic Locations

unknown confidence

And Go Lambda Runtimes

unknown confidence

And Google Dork Queries

unknown confidence

And Hidden Processes

unknown confidence

And Hipaa Compliance

unknown confidence

And Hipaa Controls

unknown confidence

And Historian Used For Testing Detection Rules Against Realistic Scada Traffic

unknown confidence

And Historical Scanning

unknown confidence

And Hollowing

unknown confidence

And Iac

unknown confidence

And Iam Bindings

unknown confidence

And Identity Based Access Control

unknown confidence

And Identity Based Access

unknown confidence

And Identity Checks

unknown confidence

And Iiot

unknown confidence

And Il Views Of Assembly Code

unknown confidence

And Immutable Backup Support

unknown confidence

And Incident Investigation

unknown confidence

And Incident Review

unknown confidence

And Industrial Protocol Support

unknown confidence

And Injected Modules

unknown confidence

And Insecure Configurations

unknown confidence

And Instant Mass Restore

unknown confidence

And Integration With Analysis Pipelines

unknown confidence

And Integration With Devops Pipelines

unknown confidence

And Intrusion Detection System For Passive Monitoring

unknown confidence

And Intrusion Detection

unknown confidence

And Investigation Workbench

unknown confidence

And Ioc Extraction

unknown confidence

And It Shop For Access Requests

unknown confidence

And Ja3

unknown confidence

And Jtag Protocols For Interfacing With Embedded Device Debug Interfaces

unknown confidence

And Jwks Spoofing

unknown confidence

And Kerberos Tickets From Windows Memory

unknown confidence

And Kernel Structure Inspection For Rootkit Detection

unknown confidence

And Kid Injection

unknown confidence

And Kubernetes Resources With Sbom Generation

unknown confidence

And Kubernetes Resources

unknown confidence

And Lambda Authorizers

unknown confidence

And Lifecycle Policies

unknown confidence

And Lighthouse Multi Tenant

unknown confidence

And Linker Detection Tool That Identifies Protection On Pe

unknown confidence

And Linkers Used To Build Pe Files

unknown confidence

And Local Outlier Factor For Anomaly Detection

unknown confidence

And Long Connections In Zeek Logs

unknown confidence

And Mach O Files

unknown confidence

And Macos Memory Analysis With Plugin Architecture

unknown confidence

And Macos

unknown confidence

And Manage Device Compliance States

unknown confidence

And Managing Vpc Firewall Rules In GCP

unknown confidence

And Managing Zeek Instances Across Single Or Clustered Deployments

unknown confidence

And Manipulating Application Behavior At Runtime

unknown confidence

And Manual Testing Tools Including Repeater

unknown confidence

And Many Other Protectors

unknown confidence

And Mask Attacks

unknown confidence

And Mdm Platforms

unknown confidence

And Memory Dumps

unknown confidence

And Metadata For Internet Connected Devices

unknown confidence

And Misconfigured Services

unknown confidence

And Missing Encryption

unknown confidence

And MITRE Att Ck Mapping

unknown confidence

And Ml Based Anomaly Detection

unknown confidence

And Mobile Evidence Analysis

unknown confidence

And Modified Kernel Modules

unknown confidence

And Modules

unknown confidence

And Monitoring Rule Performance

unknown confidence

And Monitoring Sign In Analytics

unknown confidence

And More

unknown confidence

And Mssql Enumeration And Exploitation

unknown confidence

And Mssql With Built In Modules For Password Spraying And Enumeration

unknown confidence

And Multiple Output Formats

unknown confidence

And Nano Form Factors

unknown confidence

And Network Activity

unknown confidence

And Network Connections

unknown confidence

And Network Flows

unknown confidence

And Network Monitoring

unknown confidence

And Network Protection

unknown confidence

And Network Requests For Phishing Detection

unknown confidence

And Network Requests For Phishing Url Triage

unknown confidence

And Network Requests

unknown confidence

And Network Topology

unknown confidence

And Networking

unknown confidence

And Nist

unknown confidence

And Oauth Grant Management

unknown confidence

And Object Retrieval

unknown confidence

And One Click Host Containment

unknown confidence

And Open Ports From Public Sources

unknown confidence

And Organizational Units

unknown confidence

And Other Architectures

unknown confidence

And Other Embedded Architecture Support For Firmware Binary Analysis

unknown confidence

And Other Linux Architectures

unknown confidence

And Other Protocols

unknown confidence

And Other Services For Isolated Malware Analysis Networks

unknown confidence

And Other Similarity Metrics

unknown confidence

And Other Threat Indicators

unknown confidence

And Other Tools For Low Level Smb Protocol Interaction

unknown confidence

And Otp Available In Usb A

unknown confidence

And Output Rails To Llm Applications Using Colang Flow Definitions And YAML Configuration

unknown confidence

And Packet Rate

unknown confidence

And Patching Integration

unknown confidence

And Payload Delivery Used Throughout Web Application Testing

unknown confidence

And Payload Delivery

unknown confidence

And Persistence Testing

unknown confidence

And Pickle Deserialization

unknown confidence

And Plugin Based Traffic Manipulation

unknown confidence

And Pmkid Formats

unknown confidence

And Policies From Windows

unknown confidence

And Policy Enforcement

unknown confidence

And Policy Generation

unknown confidence

And Post Exploitation Capabilities

unknown confidence

And Post Exploitation Modules For Comprehensive Smb Testing

unknown confidence

And Post Exploitation Tools For Validated Vulnerability Exploitation

unknown confidence

And Prioritization

unknown confidence

And Private Network Routing

unknown confidence

And Privileged Access Workflows

unknown confidence

And Process Activity For Observing Fileless Attack Behavior

unknown confidence

And Process Operations

unknown confidence

And Project Urls

unknown confidence

And Protection Scope Evaluation For Integrating Purview Dlp With Custom Applications And Siem Platforms

unknown confidence

And Protocol Decoding

unknown confidence

And Query Limits

unknown confidence

And Ransomware Extension Detection

unknown confidence

And Rate Limit Evasion Techniques

unknown confidence

And Raw Formats With Built In Hash Verification

unknown confidence

And Re Signing JWT Tokens With Various Attack Modes

unknown confidence

And Re Signing Jwts With Algorithm Manipulation Capabilities

unknown confidence

And Reading Enclave Console Output

unknown confidence

And Recording For Ot Remote Access

unknown confidence

And Redacting Sensitive Data

unknown confidence

And Register Data In Captured Packets

unknown confidence

And Registry Entries

unknown confidence

And Regulatory Compliance Capabilities

unknown confidence

And Reloading Configuration

unknown confidence

And Remote Execution Psexec

unknown confidence

And Repacking Firmware Images For Security Testing

unknown confidence

And Replaying API Requests With Extensions Like Autorize For Automated Authorization Testing

unknown confidence

And Replaying Requests With Sql Injection Payloads Across All Parameter Types

unknown confidence

And Report

unknown confidence

And Reporting

unknown confidence

And Resource Directories

unknown confidence

And Resource Inspection In A Single Interface

unknown confidence

And Resource Policies

unknown confidence

And Response Bodies

unknown confidence

And Response Platform

unknown confidence

And Restructuring Pdfs For Easier Analysis

unknown confidence

And Reviewing Activity Explorer Data And Dlp Alerts

unknown confidence

And Risk Based Access Controls For Azure Ad Applications

unknown confidence

And Risk Based Alerting

unknown confidence

And Risk

unknown confidence

And Risky User Behavior

unknown confidence

And Role Bindings

unknown confidence

And Rpki Status Changes

unknown confidence

And Rule Deployment

unknown confidence

And Runtime Process Monitoring

unknown confidence

And Runtime Telemetry

unknown confidence

And Runtime Versions

unknown confidence

And Scripted Analysis Pipelines

unknown confidence

And Scripting Capabilities

unknown confidence

And Scripting Support For Multiple Architectures

unknown confidence

And Secret Caching For Applications

unknown confidence

And Secure Boot Configuration Auditing

unknown confidence

And Security Anomalies

unknown confidence

And Security Feature Support

unknown confidence

And Security Signals

unknown confidence

And Sending Broadcasts

unknown confidence

And Sensitive Information Types

unknown confidence

And Sequencer

unknown confidence

And Service Creation Across The Enterprise

unknown confidence

And Sharing

unknown confidence

And Shimmer Analysis Of Speech Samples

unknown confidence

And Simulating Master Slave Communication In Test Environments

unknown confidence

And Sniffing Modbus Frames Enables Field Level Access To Mbap Headers

unknown confidence

And Social Media Analysis

unknown confidence

And Social Media Reconnaissance

unknown confidence

And Social Media

unknown confidence

And Spectrogram Generation

unknown confidence

And Sspm

unknown confidence

And Stakeholder Distribution Controls

unknown confidence

And Stakeholder Reporting Dashboards

unknown confidence

And Stepping Through Linux Binary Execution

unknown confidence

And Structural Patterns

unknown confidence

And Suspicious Command Patterns

unknown confidence

And Suspicious Indicators

unknown confidence

And System Binary Modifications

unknown confidence

And Tampering With JWT Tokens To Test Authentication Bypasses

unknown confidence

And Team Collaboration

unknown confidence

And Technical Intelligence For Adversary Profiling

unknown confidence

And Third Party Edr

unknown confidence

And Third Party Tools Into A Unified Dashboard

unknown confidence

And Threat Explorer For Investigation

unknown confidence

And Threat Hunting Capabilities

unknown confidence

And Threat Hunting

unknown confidence

And Threat Intelligence

unknown confidence

And Threat Protection Across Azure

unknown confidence

And TLS Connections

unknown confidence

And Token Exchanges

unknown confidence

And Transcription Logging

unknown confidence

And Transforming Data Useful For Deobfuscating Encoded Iocs

unknown confidence

And Trend Analysis

unknown confidence

And Triage Workflow Management

unknown confidence

And Trustsec Integration

unknown confidence

And Ttls

unknown confidence

And Ttps

unknown confidence

And Uefi Analysis

unknown confidence

And Uefi Configuration

unknown confidence

And Url Indicators For Matching Against Security Logs

unknown confidence

And Validating Cyclonedx Sboms Programmatically

unknown confidence

And Validating Firewall Effectiveness

unknown confidence

And Validating Stix 2 0

unknown confidence

And Values For Real Time Alerting

unknown confidence

And Verify Authentication Response Functions

unknown confidence

And Verifying Entries In The Rekor Transparency Log

unknown confidence

And Viewing Registered Accounts

unknown confidence

And Virtual Host Enumeration

unknown confidence

And Vpn Capabilities With Modbus

unknown confidence

And Vulnerability Assessment

unknown confidence

And Vulnerability Data For Ip Addresses

unknown confidence

And Vulnerability Detection Via The Nmap Scripting Engine

unknown confidence

And Vulnerability Management Designed For Critical Infrastructure

unknown confidence

And Vulnerability Searches

unknown confidence

And Winrm Traffic Analysis

unknown confidence

And Wmi Monitoring

unknown confidence

And Workload Protection

unknown confidence

And Yara Rules From Text

unknown confidence

And Zone Transfer Queries

unknown confidence

Androguard

unknown confidence

Android Backup Extractor

unknown confidence

Android Lint

unknown confidence

Android Studio Profiler

unknown confidence

Anomali Threatstream

unknown confidence

Anomaly Detection

unknown confidence

Ansible Lockdown

unknown confidence

Anti Ransomware Detection

unknown confidence

Any Run API

unknown confidence

Any Run

unknown confidence

API Fuzzer

unknown confidence

API Gateway

unknown confidence

API Monitor

unknown confidence

Apigee

unknown confidence

Apktool

unknown confidence

Appcompatcacheparser

unknown confidence

Applocker

unknown confidence

Archer

unknown confidence

Arjun

unknown confidence

Arkime

unknown confidence

Arm

unknown confidence

Arp Scan

unknown confidence

Arp

unknown confidence

Arpspoof

unknown confidence

Arpwatch

unknown confidence

Artifact Hash

unknown confidence

Asr Rules

unknown confidence

Assessing Third Party Risk

unknown confidence

Asset Identity Framework

unknown confidence

Ast Analysis

unknown confidence

Athena

unknown confidence

Atomic Red Team Atomics

unknown confidence

Atomic Red Team

unknown confidence

Att Ck Navigator

unknown confidence

Att Ck Workbench

unknown confidence

Attackiq

unknown confidence

Attestation

unknown confidence

Attivo Networks

unknown confidence

Audit Log

unknown confidence

Auditd

unknown confidence

Ausearch

unknown confidence

Author

unknown confidence

Authorization Codes

unknown confidence

Authorize

unknown confidence

Auto Classification

unknown confidence

Auto Labeling Rules

unknown confidence

Autobahn Testsuite

unknown confidence

Automation

unknown confidence

Automox

unknown confidence

Autopsy

unknown confidence

Autorepeater

unknown confidence

Autorize

unknown confidence

Autoruns

unknown confidence

Aveva Historian

unknown confidence

Avml

unknown confidence

Awesome Waf

unknown confidence

AWS Access Analyzer

unknown confidence

AWS API Gateway

unknown confidence

AWS Athena

unknown confidence

AWS Audit Manager

unknown confidence

AWS Backup

unknown confidence

AWS Cli

unknown confidence

AWS Cloudtrail

unknown confidence

AWS Config

unknown confidence

AWS Cost Anomaly Detection

unknown confidence

AWS Detective

unknown confidence

AWS Ecr

unknown confidence

AWS Firewall Manager

unknown confidence

AWS Guardduty

unknown confidence

AWS Iam Access Analyzer

unknown confidence

AWS Iam Identity Center

unknown confidence

AWS Keys

unknown confidence

AWS Kms

unknown confidence

AWS Lambda Power Tuning

unknown confidence

AWS Lambda

unknown confidence

AWS Managed Rules

unknown confidence

AWS Nitro Enclaves Sdk C

unknown confidence

AWS S3 Object Lock

unknown confidence

AWS Secrets Manager

unknown confidence

AWS Security Hub Cspm

unknown confidence

AWS Security Hub

unknown confidence

AWS Systems Manager

unknown confidence

AWS Verified Access

unknown confidence

AWS Waf

unknown confidence

AWS X Ray

unknown confidence

AWS

unknown confidence

Azure Activity Logs

unknown confidence

Azure Ad Conditional Access

unknown confidence

Azure Ad External Identities

unknown confidence

Azure API Management

unknown confidence

Azure Arc

unknown confidence

Azure Backup

unknown confidence

Azure Cli

unknown confidence

Azure Conditional Access

unknown confidence

Azure Data Explorer

unknown confidence

Azure Immutable Blob

unknown confidence

Azure Information Protection

unknown confidence

Azure Logic Apps

unknown confidence

Azure Monitor

unknown confidence

Azure Policy

unknown confidence

Azure Resource Graph

unknown confidence

Azure Waf

unknown confidence

Azure

unknown confidence

Azureadrecon

unknown confidence

Baddns

unknown confidence

Bandit

unknown confidence

Banners

unknown confidence

Barnyard2

unknown confidence

Bas

unknown confidence

Base

unknown confidence

Batch Processing

unknown confidence

Batchql

unknown confidence

Beacon Detection

unknown confidence

Bettercap 2 X

high confidence

Bettercap

An extensible, cross‑platform network attack and reconnaissance framework for 802.11 Wi‑Fi, Ethernet/IPv4/IPv6, BLE, HID, and CAN‑bus, featuring MITM components, sniffing, spoofing, and scriptable automation via caplets.

unknown confidence

Beyondcorp Enterprise Connectors

unknown confidence

Beyondcorp

unknown confidence

Beyondtrust Privileged Remote Access

unknown confidence

Bfg Repo Cleaner

unknown confidence

Bgpalerter

unknown confidence

Binary Ninja

unknown confidence

Bindings

unknown confidence

Binwalk

unknown confidence

Bitlocker Recovery Password Viewer

unknown confidence

Bitlocker

unknown confidence

Bleak

unknown confidence

Blkls

unknown confidence

Block Counts

unknown confidence

Blockchain Com API

unknown confidence

Blockchain

unknown confidence

Blockdev

unknown confidence

Blocked

unknown confidence

Blockstream Info

unknown confidence

Bloodhound Ce

high confidence

BloodHound (Community Edition)

BloodHound is an open‑source tool from SpecterOps that applies graph theory to identity and access relationships to uncover attack paths (privilege escalation and lateral movement) across Microsoft Active Directory, Azure AD, and other platforms via an extension model.

unknown confidence

Bootkits Analyzer

unknown confidence

Borgbackup

unknown confidence

Boss Of The Soc

unknown confidence

Boto3 Cloudtrail Client

unknown confidence

Breach Data

unknown confidence

Bridgecrew

unknown confidence

Broadcast

unknown confidence

Broken Link Checker

unknown confidence

Browser Developer Tools

unknown confidence

Browser Devtools

unknown confidence

Browsinghistoryview

unknown confidence

Brute Force

unknown confidence

Btlejuice

unknown confidence

Bulk Extractor

unknown confidence

Burp Collaborator

unknown confidence

Burp Java Deserialization Scanner

unknown confidence

Burp JWT Editor

unknown confidence

Burp Sequencer

unknown confidence

Burp Suite Community

unknown confidence

Burp Suite JWT Editor

unknown confidence

Burp Suite Professional

unknown confidence

Burp Suite Repeater

unknown confidence

Burp Suite Turbo Intruder

high confidence

Burp Suite

An intercepting proxy–based toolkit and dynamic scanner for discovering and analyzing web application and API security issues across desktop and enterprise (DAST) editions.

unknown confidence

Burp Turbo Intruder

unknown confidence

Bus Pirate

unknown confidence

Bypassing Security Controls

unknown confidence

Cabby

unknown confidence

Cache Snooping

unknown confidence

Cado Response

unknown confidence

Caldera

unknown confidence

Calico

unknown confidence

Callback

unknown confidence

Can I Take Over Xyz

unknown confidence

Canarytoken

unknown confidence

Canarytokens Org And Thinkst Canary Platforms

unknown confidence

Canarytokens Org

unknown confidence

Canarytokens

unknown confidence

Capa

unknown confidence

Cape Sandbox

unknown confidence

Cape

unknown confidence

Capinfos

unknown confidence

Captive Portal

unknown confidence

Carbon Black App Control

unknown confidence

Cartography

unknown confidence

Casb

unknown confidence

Cdn Specific Tools

unknown confidence

Cdp

unknown confidence

Cedar Policy Language

unknown confidence

Cellebrite Physical Analyzer

unknown confidence

Cellebrite Ufed

unknown confidence

Cerby

unknown confidence

Certipy

unknown confidence

Certspotter

unknown confidence

Cff Explorer

unknown confidence

Chainalysis Reactor

unknown confidence

Chainsaw

unknown confidence

Charles Proxy

unknown confidence

Checkov

unknown confidence

Chipsec

unknown confidence

Chkrootkit

unknown confidence

Chrome Devtools

unknown confidence

Chrome Enterprise Premium

unknown confidence

Chrome Enterprise

unknown confidence

Chromecacheview

unknown confidence

Chronicle Soar

unknown confidence

Ci

unknown confidence

Cimsession

unknown confidence

Circl Pdns

unknown confidence

Cis Cat Pro Assessor

unknown confidence

Cis Docker Benchmark V1 8 0 To Minimize Attack Surface

unknown confidence

Cisa Ics Cert

unknown confidence

Cisa Kev Catalog

unknown confidence

Cisa Stopransomware Guide

unknown confidence

Cisa Tabletop Exercise Packages

unknown confidence

Cisco Catalyst

unknown confidence

Cisco Industrial Ethernet Switches

unknown confidence

Cisco Isa 3000

unknown confidence

Cisco Ise

unknown confidence

Cisco Umbrella

unknown confidence

Claim Manipulation

unknown confidence

Clairvoyance

unknown confidence

Clamav

unknown confidence

Claroty Ctd

unknown confidence

Claroty Secure Remote Access

unknown confidence

Claroty Xdome

unknown confidence

Claroty

unknown confidence

Class Dump

unknown confidence

Classifying

unknown confidence

Claude

unknown confidence

Clickjack Tester

unknown confidence

Cloud Asset Inventory

unknown confidence

Cloud Audit Logs

unknown confidence

Cloud Logging

unknown confidence

Cloud

unknown confidence

Cloudflare Access

unknown confidence

Cloudflare Device Posture

unknown confidence

Cloudflare Diagnostics

unknown confidence

Cloudflare Gateway

unknown confidence

Cloudflare Logpush

unknown confidence

Cloudflare Tunnel

unknown confidence

Cloudflare

unknown confidence

Cloudformation Stacksets

unknown confidence

Cloudformation

unknown confidence

Cloudfox

unknown confidence

Cloudfront

unknown confidence

Cloudtrail Lake

unknown confidence

Cloudtrail

unknown confidence

Cloudwatch Logs Insights

unknown confidence

Cloudwatch Metrics

unknown confidence

Cloudwatch

unknown confidence

Cni Plu

unknown confidence

Cobalt Strike

unknown confidence

Cobaltstrikeparser

unknown confidence

Code42 Incydr

unknown confidence

Codeql To Perform Automated Static Analysis And Vulnerability Detection Across Repositories At Enterprise Scale

unknown confidence

Codeql

unknown confidence

Cohesity Dataprotect

unknown confidence

Colang 2 0

unknown confidence

Collection Enumeration

unknown confidence

Commix

unknown confidence

Community Maintained Database Of 130 Documented Adversary Groups With Referenced Campaign Reports

unknown confidence

Commvault

unknown confidence

Compiler

unknown confidence

Compilers

unknown confidence

Component

unknown confidence

Compression Formats

unknown confidence

Compromised Credentials

unknown confidence

Compute

unknown confidence

Conditional Access Policies

unknown confidence

Conducting

unknown confidence

Config Aggregator

unknown confidence

Config Conformance Packs

unknown confidence

Config

unknown confidence

Confluence

unknown confidence

Conftest

unknown confidence

Connection

unknown confidence

Consent Permissions

unknown confidence

Constrainttemplates

unknown confidence

Consul Template

unknown confidence

Container Diff

unknown confidence

Containerlab

unknown confidence

Containers

unknown confidence

Containment

unknown confidence

Content Filtering

unknown confidence

Content Type Converter

unknown confidence

Cookies

unknown confidence

Correlation Searches

unknown confidence

Correlation

unknown confidence

Cors Scanner

unknown confidence

Corscanner

unknown confidence

Cortex Data Lake

unknown confidence

Cortex Xsoar

unknown confidence

Cosign

unknown confidence

Covenant C2

unknown confidence

Cowpatty

unknown confidence

Cowrie

unknown confidence

Crackle

medium confidence

CrackMapExec (CME)

Open-source post-exploitation and lateral movement framework for automating credential validation, enumeration, and command execution across Windows/Active Directory networks over protocols like SMB, WinRM/WMI, MSSQL, and LDAP.

unknown confidence

Createfunction And Data Events

unknown confidence

Creation Timestamps

unknown confidence

Credential Dumping

unknown confidence

Credential Harvesting

unknown confidence

Credential Testing

unknown confidence

Credential Vaulting

unknown confidence

Cross Platform Backup Tool With Built In Encryption And Deduplication

unknown confidence

Crowdstrike Falcon API

unknown confidence

Crowdstrike Falcon Console

unknown confidence

Crowdstrike Falcon Device Control

unknown confidence

Crowdstrike Falcon Identity Protection

unknown confidence

Crowdstrike Falcon Intelligence

unknown confidence

Crowdstrike Falcon Zta

unknown confidence

Crowdstrike Falcon

unknown confidence

Crowdstrike Zta Integration

unknown confidence

Crowdstrike

unknown confidence

Crt Sh

unknown confidence

Cryptotester

unknown confidence

Csp Bypass

unknown confidence

Csp Evaluator

unknown confidence

Csp Scanner

unknown confidence

Csrftester

unknown confidence

Ct Woodpecker

unknown confidence

Ctid Att Ck Workbench

unknown confidence

Cuckoo Sandbox

unknown confidence

Cuckoodroid

unknown confidence

Curl

unknown confidence

Custom Python Scripts

unknown confidence

Custom Scripts

unknown confidence

Cvss Scoring

unknown confidence

Cwp

unknown confidence

Cyberark Or Beyondtrust For Secure Administrative Operations

unknown confidence

Cyberark Privileged Access Security

unknown confidence

Cyberark

unknown confidence

Cyberchef

unknown confidence

Cyclonedx Python Lib

unknown confidence

Cycript

unknown confidence

Cylr

unknown confidence

Dalfox

unknown confidence

Damerau Levenshtein

unknown confidence

Dark Web

unknown confidence

Data Classification Insights

unknown confidence

Database Extraction

unknown confidence

Datadog

unknown confidence

Db Browser For Sqlite

unknown confidence

Dbeaver

unknown confidence

Dc3dd

unknown confidence

Dce Rpc

unknown confidence

Dcfldd

unknown confidence

Dcsync

unknown confidence

Dd

unknown confidence

De Identifying

unknown confidence

De4dot

unknown confidence

De4js

unknown confidence

Debug Endpoints

unknown confidence

Decoding Resources To Near Original Form

unknown confidence

Decompiler

unknown confidence

Decrypting

unknown confidence

Deepset

unknown confidence

Defanging

unknown confidence

Defectdojo

unknown confidence

Delinea Distributed Engine

unknown confidence

Delinea Secret Server

unknown confidence

Demo Yubico Com

unknown confidence

Dependabot

unknown confidence

Deploy Configuration Profiles

unknown confidence

Deployed In Dmz For Enterprise Access

unknown confidence

Detect It Easy

unknown confidence

Developer Portal

unknown confidence

Device

unknown confidence

Dhcp

unknown confidence

Dialog

unknown confidence

Dig

unknown confidence

Digital Guardian

unknown confidence

Dionaea

unknown confidence

Dirbuster

unknown confidence

Distroless Images

unknown confidence

Distroless

unknown confidence

Dive

unknown confidence

Dkimpy

unknown confidence

Dll Export Viewer

unknown confidence

Dll

unknown confidence

Dlp Policies New Dlpcompliancepolicy

unknown confidence

Dlp Policies

unknown confidence

Dlp Violations

unknown confidence

Dlp

unknown confidence

Dnp3

unknown confidence

DNS Brute Forcing

unknown confidence

DNS Filtering

unknown confidence

DNS Logs

unknown confidence

DNS Queries

unknown confidence

DNS Query Analysis

unknown confidence

DNS Response Policy Zone

unknown confidence

DNS Spoofing

unknown confidence

DNS Tunneling

unknown confidence

DNS With Cross Platform Implants

unknown confidence

DNS

unknown confidence

Dnspy

unknown confidence

Dnspython

high confidence

DNSRecon

DNSRecon is a Python-based DNS enumeration tool for security assessments that automates record discovery, zone transfer testing, DNSSEC zone walking, cache snooping, reverse lookups, and wordlist-based subdomain brute forcing, with export to XML/CSV/JSON and optional REST API and Shodan-assisted enrichment.

unknown confidence

Dnssec Validation

unknown confidence

Dnstwist

unknown confidence

Dnsx

unknown confidence

Docker Bench Security

unknown confidence

Docker Buildkit

unknown confidence

Docker Diff

unknown confidence

Docker Explorer

unknown confidence

Docker Inspect

unknown confidence

Dom Invader

unknown confidence

Dom

unknown confidence

Domain

unknown confidence

Domains

unknown confidence

Dompurify

unknown confidence

Dotdotpwn

unknown confidence

Dotfuscator

unknown confidence

Dotpeek

unknown confidence

Drag And Drop Playbook Builder With 2 800 Automated Actions

unknown confidence

Dragos Platform

unknown confidence

Dredd

unknown confidence

Drivers

unknown confidence

Drozer

unknown confidence

Dsdump

unknown confidence

Dsinternals Powershell Module

unknown confidence

Dsinternals

unknown confidence

Dtd Finder

unknown confidence

Dtex Intercept

unknown confidence

Dumpit

unknown confidence

Duo Security

unknown confidence

Duo

unknown confidence

Eclecticiq

unknown confidence

Ed25519

unknown confidence

Ediscovery

unknown confidence

Editcap

unknown confidence

Editing

unknown confidence

Edr And Process Telemetry

unknown confidence

Edr

unknown confidence

Elastic Agent

unknown confidence

Elastic Detection Rules

unknown confidence

Elastic Endpoint Security

unknown confidence

Elastic Endpoint

unknown confidence

Elastic Kibana Dashboard

unknown confidence

Elastic Security Eql

unknown confidence

Elastic Security

unknown confidence

Elastic Siem Ml Jobs

unknown confidence

Elastic Siem

unknown confidence

Elastic Stack

unknown confidence

Elastic

unknown confidence

Elasticsearch

unknown confidence

Elf

unknown confidence

Elk Stack

unknown confidence

Email Gateway

unknown confidence

Email Security

unknown confidence

Email Templates

unknown confidence

Email

unknown confidence

Emet

unknown confidence

Employee Names

unknown confidence

Emux

unknown confidence

Enabling Auditing Of Enclave Originated Cryptographic Operations

unknown confidence

Enabling Comparison Of Planned Vs Executed Vs Detected Techniques

unknown confidence

Enabling Download Count Comparison Between Suspected Typosquats And Their Targets

unknown confidence

Enabling

unknown confidence

Encoders

unknown confidence

Encrypting Responses To The Enclave S Ephemeral Public Key

unknown confidence

Encryption As A Service

unknown confidence

Encryption

unknown confidence

Endpoint Protector

unknown confidence

Endpoint Verification

unknown confidence

Engineering Workstations

unknown confidence

Entropy Analysis

unknown confidence

Entropy Calculation

high confidence

enum4linux-ng

A next-generation rewrite of enum4linux that enumerates information from Windows and Samba systems via SMB/RPC/LDAP, adds structured JSON/YAML output, and wraps core Samba client tools for use by security professionals and CTF players.

unknown confidence

Envoy Proxy

unknown confidence

Envoy Rate Limit Service

unknown confidence

Eql Sequences

unknown confidence

Eric Zimmerman S Tools

unknown confidence

Eric Zimmerman Tools

unknown confidence

Error Messages

unknown confidence

Erythrite

unknown confidence

Escalation

unknown confidence

Eslint Security Plugin

unknown confidence

Espresso

unknown confidence

Essential For Blind Stored Xss

unknown confidence

Et Pro

unknown confidence

Etc

unknown confidence

Ethernet

unknown confidence

Ettercap

unknown confidence

Evebox

unknown confidence

Event Classification

unknown confidence

Event Log Explorer

unknown confidence

Eventbridge And Lambda To Enable Real Time Incident Response

unknown confidence

Evilginx2

unknown confidence

Evilginx3

unknown confidence

Evtxecmd

unknown confidence

Evtxexport

unknown confidence

Exabeam Advanced Analytics

unknown confidence

Exabeam

unknown confidence

Examining Memory

unknown confidence

Excel

unknown confidence

Exec

unknown confidence

Execution Role Permissions

unknown confidence

Exiftool

unknown confidence

Exploit

unknown confidence

Exploits

unknown confidence

Express Rate Limit

unknown confidence

Extracting Dxe Drivers

unknown confidence

Extracting Vba Macros

unknown confidence

Extracting

unknown confidence

Extrahop

unknown confidence

Fail2ban 0 11

unknown confidence

Fail2ban Client

unknown confidence

Fail2ban Regex

unknown confidence

Fake Router6

unknown confidence

Fakenet Ng

unknown confidence

Falco And Opa Policies

unknown confidence

Falco Rules

unknown confidence

Falco

unknown confidence

Falcon Data Replicator

unknown confidence

Falcon Siem Connector

unknown confidence

Farsight Dnsdb

unknown confidence

Feeding Results Into Splunk

unknown confidence

Feitian

unknown confidence

Fema Homeland Security Exercise And Evaluation Program

unknown confidence

Fema Hseep

unknown confidence

Feodo Tracker

unknown confidence

Feroxbuster

unknown confidence

Ffmpeg

high confidence

ffuf

ffuf is a fast, flexible web fuzzer for web content discovery and request templating. It automates path, parameter, and virtual host discovery using wordlists and response-based match/filter logic, supporting machine-readable outputs for integration into broader security workflows.

unknown confidence

Fido2 Security Keys

unknown confidence

Fido2

unknown confidence

Field Suggestions

unknown confidence

File Extraction

unknown confidence

File Systems

unknown confidence

File

unknown confidence

Filebeat

unknown confidence

Filesystem

unknown confidence

Filesystems

unknown confidence

Filtering By Function Code

unknown confidence

Filtering

unknown confidence

Findcrypt

unknown confidence

Firewall Zones

unknown confidence

Firmadyne

unknown confidence

Firmae

unknown confidence

Firmware Mod Kit

unknown confidence

Flare

unknown confidence

Flashpoint

unknown confidence

Flashrom

unknown confidence

Flask Limiter

unknown confidence

Fleetdm

unknown confidence

Floss

unknown confidence

Fls

unknown confidence

Fluentd

unknown confidence

Forcepoint Dlp

unknown confidence

Forcepoint Insider Threat

unknown confidence

Foremost

unknown confidence

Forseti Security

unknown confidence

Fortinet Fortigate Rugged Series

unknown confidence

Fortinet Fortigate Rugged

unknown confidence

Freddy

unknown confidence

Freeradius

unknown confidence

Frida Discover

unknown confidence

Frida Ios Dump

unknown confidence

Frida Repl

unknown confidence

Frida Tools

unknown confidence

Frida Trace

unknown confidence

Frida

unknown confidence

Frogger

unknown confidence

Frrouting

unknown confidence

Fsrm

unknown confidence

Ftk Imager

unknown confidence

Fulcio

unknown confidence

Function Codes

unknown confidence

Fusion Ml Engine

unknown confidence

Fuzz Lightyear

unknown confidence

Fwaas

unknown confidence

Gam

unknown confidence

Gatekeeper

unknown confidence

Gatling

unknown confidence

Gattacker

unknown confidence

Gcloud Cli

unknown confidence

Gcloud Compute Firewall Rules

unknown confidence

GCP Audit Logs

unknown confidence

GCP Cloud Logging

unknown confidence

GCP Event Threat Detection

unknown confidence

GCP Identity Aware Proxy

unknown confidence

GCP Security Auditing Tool Generating Comprehensive Risk Reports From API Data Collection

unknown confidence

GCP Security Command Center

unknown confidence

Gcpbucketbrute

unknown confidence

Gdb

unknown confidence

Generate Authentication Options

unknown confidence

Getnpusers

unknown confidence

Gf

unknown confidence

Ghidra

unknown confidence

Git Dumper

unknown confidence

Git Filter Repo

unknown confidence

Git Repos

unknown confidence

Git Secrets

unknown confidence

Github Advanced Security

unknown confidence

Github Secret Scanning

unknown confidence

Github Security Overview

unknown confidence

Gitlab Ci

unknown confidence

Gitlab Wiki

unknown confidence

Gitleaks

unknown confidence

Globalprotect Agent

unknown confidence

Gmer

unknown confidence

Gobuster Vhost

high confidence

Gobuster

High-performance, wordlist-driven enumerator for web content, DNS subdomains, virtual hosts, and select cloud/TFTP targets.

unknown confidence

Godpotato

unknown confidence

Google Admin Console

unknown confidence

Google Argon

unknown confidence

Google Beyondcorp Enterprise

unknown confidence

Google Cloud Dlp API

unknown confidence

Google Cloud Iap

unknown confidence

Google Titan Storing Cryptographic Credentials For Phishing Resistant Authentication

unknown confidence

Google Workspace Alert Center

unknown confidence

Gopherus

unknown confidence

Gophish

unknown confidence

Gowitness

unknown confidence

Gpg

unknown confidence

Gpresult

unknown confidence

Gradient Boosting

unknown confidence

Grafana

unknown confidence

Graph Analysis

unknown confidence

Graphql Cop

unknown confidence

Graphql Voyager

unknown confidence

Grassmarlin

unknown confidence

Greenbone

unknown confidence

Greynoise

unknown confidence

Grficsv2

unknown confidence

Gridsure

unknown confidence

Group Policy Management Console

unknown confidence

Group Policy

unknown confidence

Groups

unknown confidence

Grr Rapid Response

unknown confidence

Grype

unknown confidence

Gtfobins

unknown confidence

Guardduty Lambda Protection

unknown confidence

Guardicore Agents

unknown confidence

Guardicore Centra

unknown confidence

Guardicore Insight

unknown confidence

Guardicore Reveal

unknown confidence

Guardrails Ai

unknown confidence

Guest Management

unknown confidence

H2csmuggler

unknown confidence

Hackvertor

unknown confidence

Hadolint

unknown confidence

Handshake Capture

unknown confidence

Harbor

unknown confidence

Hardcoded Secrets

unknown confidence

Hardenize

unknown confidence

Hardware Tokens

high confidence

Hashcat

A high-performance, cross‑platform password recovery tool that supports hundreds of hash and key‑derivation formats, multiple attack modes, and GPU/accelerator backends for offline credential security testing.

unknown confidence

Hashdeep

unknown confidence

Hashes

unknown confidence

Hashicorp Boundary

unknown confidence

Hashicorp Vault

unknown confidence

Hashlib

unknown confidence

Have I Been Pwned Enterprise

unknown confidence

Haveibeenpwned

unknown confidence

Havij

unknown confidence

Havoc

unknown confidence

Hayabusa

unknown confidence

Hcxdumptool

unknown confidence

Hcxtools

unknown confidence

Hdparm

unknown confidence

Hex

unknown confidence

Hidden Processes

unknown confidence

Hierarchical Firewall Policies

unknown confidence

Hindsight

unknown confidence

Hipaa

unknown confidence

Historians

unknown confidence

Hmac Sha256

unknown confidence

Hmi

unknown confidence

Hollows Hunter

unknown confidence

Honeydb

unknown confidence

Honeywell Forge Cybersecurity

unknown confidence

Hooking

unknown confidence

Host Lists

unknown confidence

Hostapd Mana

unknown confidence

Hosts

unknown confidence

Hp Aruba Cx

unknown confidence

Hping3

unknown confidence

Hstspreload Org

unknown confidence

Hvac

high confidence

Ory Hydra

Ory Hydra is an open-source, OpenID Certified OAuth 2.0 and OpenID Connect (OIDC) authorization server that exposes headless APIs for issuing and managing tokens used to protect APIs and applications.

unknown confidence

I2c

unknown confidence

Iac Scanning

unknown confidence

Iam Access Analyzer

unknown confidence

Iam Policy Simulator

unknown confidence

Iam Recommender

unknown confidence

Iap Tcp Forwarding

unknown confidence

Ibm Qradar Siem

unknown confidence

Icarus

unknown confidence

Icat

unknown confidence

Icmp With Control Over Flags

unknown confidence

Icmp

unknown confidence

Ics Aware Ids And Protocol Deep Packet Inspection

unknown confidence

Id Ransomware

unknown confidence

Ida Pro And Ghidra With Techniques For Handling Non Null Terminated Strings

unknown confidence

Ida Pro

unknown confidence

Identity Filtering

unknown confidence

Identityiq Compliance Manager

unknown confidence

Identityiq Report Builder

unknown confidence

Ideviceinstaller

unknown confidence

Ids Signatures

unknown confidence

Idt Hooks

unknown confidence

Idt

unknown confidence

Iec 60870 5 104

unknown confidence

Iec 62443 And Nist Sp 800 82 Guidelines

unknown confidence

Iexplorer

unknown confidence

Ileapp

unknown confidence

Ilspy

unknown confidence

Images

unknown confidence

Immersive Labs

unknown confidence

Impacket Secretsdump Py

high confidence

Impacket

Open-source Python library and example tools that implement and manipulate network protocols (notably SMB, MSRPC, Kerberos, NTLM, LDAP, MSSQL) to enable low-level packet crafting, protocol clients, and security testing workflows across Windows-centric enterprise networks. ([github.com](https://github.com/fortra/impacket))

unknown confidence

Implementation Tiers To Measure Organizational Cybersecurity Posture And Create Improvement Roadmaps

unknown confidence

Imports

unknown confidence

Indicators

unknown confidence

Inetsim

unknown confidence

Infection Monkey

unknown confidence

Infoblox DNS Firewall

unknown confidence

Injected Processes

unknown confidence

Inql

unknown confidence

Inspecting

unknown confidence

Integration

unknown confidence

Intel 471

unknown confidence

Intent Fuzzer

unknown confidence

Interact Sh

unknown confidence

Interactsh

unknown confidence

Interception

unknown confidence

Intruder

unknown confidence

Intune App Sdk

unknown confidence

Intune App Wrapping Tool

unknown confidence

Invoke Atomicredteam

unknown confidence

Ioc Tables

unknown confidence

Iocextract

unknown confidence

Iot

unknown confidence

Ip Addressing

unknown confidence

Ip Ranges

unknown confidence

Ip

unknown confidence

Iperf3

unknown confidence

Ips

unknown confidence

Iptables

unknown confidence

Irp Hooks

unknown confidence

Is Is With Rpki Validation Capabilities

unknown confidence

Ja3

unknown confidence

Jadx

unknown confidence

Jamf Pro

unknown confidence

Jaro Winkler

unknown confidence

Java

unknown confidence

Jefferson

unknown confidence

Jira Service Management

unknown confidence

Jira

unknown confidence

Jitter

unknown confidence

Jlecmd

unknown confidence

Joe Sandbox

high confidence

John the Ripper

John the Ripper is an open-source, offline password auditing tool from Openwall. The community “Jumbo” edition adds extensive hash/credential format support and optional GPU acceleration via OpenCL.

unknown confidence

Jpeginfo

unknown confidence

Jq

unknown confidence

Jscrambler

unknown confidence

Jsdetox

unknown confidence

JSON For Ci

unknown confidence

JSON Schema Compliance

unknown confidence

Jsql Injection

unknown confidence

Junit

unknown confidence

JWT Editor

unknown confidence

JWT Io

unknown confidence

JWT Tool

unknown confidence

Kadimus

unknown confidence

Kamacite

unknown confidence

Kape

unknown confidence

Kerberos Used For Relay Attacks And Remote Execution

unknown confidence

Kerberos

unknown confidence

Kev Catalog

unknown confidence

Key Confusion

unknown confidence

Kics

unknown confidence

Kinesis Firehose

unknown confidence

King Phisher

unknown confidence

Kismet

unknown confidence

Kiterunner

unknown confidence

Kmstool Enclave Cli

unknown confidence

Kolide

unknown confidence

Kong Gateway

unknown confidence

Kong Rate Limiting Plugin

unknown confidence

Kube Bench

unknown confidence

Kubeaudit

unknown confidence

Kubectl

unknown confidence

Kubernetes

unknown confidence

Kubesec

unknown confidence

Kubiscan

unknown confidence

Kyverno

unknown confidence

Label Policies

unknown confidence

Landing Pages

unknown confidence

Last

unknown confidence

Launching

unknown confidence

Layers

unknown confidence

Lazagne

unknown confidence

Ldap Integration

unknown confidence

Ldap

unknown confidence

Lecmd

unknown confidence

Levenshtein Distance Use For Proactive Phishing Domain Detection And Certificate Monitoring

unknown confidence

Levenshtein Distance

unknown confidence

Lfisuite

unknown confidence

Lgpo Exe

unknown confidence

Lib4sbom

unknown confidence

Libimobiledevice

unknown confidence

Librosa

unknown confidence

Lifecycle Management

unknown confidence

Lightweight Pattern Matching Sast Tool With 3000 Community Rules And Custom Rule Support

unknown confidence

Lime And Volatility

unknown confidence

Lime

unknown confidence

Linked Libraries

high confidence

linPEAS

An open-source Linux/Unix privilege-escalation enumeration script in the PEASS-ng suite that audits a host for misconfigurations, vulnerabilities, and environmental conditions that could enable local privilege escalation.

unknown confidence

Linux Exploit Suggester

unknown confidence

Listing

unknown confidence

Llm API Gpt 4

unknown confidence

Llm Based Detection

unknown confidence

Lnk Explorer

unknown confidence

Lnk Parser

unknown confidence

Lnkparse3

unknown confidence

Location

unknown confidence

Log Analytics Workspace

unknown confidence

Log2timeline

unknown confidence

Logparser

unknown confidence

Lolbas Project

unknown confidence

Lolbas

unknown confidence

Lsblk

unknown confidence

Lynis

unknown confidence

Macos

unknown confidence

Mactime

unknown confidence

Magnet Axiom

unknown confidence

Magnet Ram Capture

unknown confidence

Mailhog

unknown confidence

Malleable C2 Profiles

unknown confidence

Malpedia Yara

unknown confidence

Malpedia

unknown confidence

Maltego

unknown confidence

Malware Families

unknown confidence

Malware Mutex

unknown confidence

Malwarebazaar

unknown confidence

Manage Bde Exe

unknown confidence

Mandiant Advantage Threat Intelligence

unknown confidence

Manually Banning

unknown confidence

Maps

unknown confidence

Markets

unknown confidence

Marshalsec

unknown confidence

Mbam

unknown confidence

Meat

unknown confidence

Memcached

unknown confidence

Memory

unknown confidence

Memprocfs

unknown confidence

Mergecap

high confidence

Metasploit Framework

An extensible Ruby-based platform from Rapid7 for developing, testing, and executing exploits, payloads, and related modules against target systems, with data management and remote APIs for integration into security workflows.

unknown confidence

Mfa

unknown confidence

Mftecmd

unknown confidence

Mftexplorer

unknown confidence

Microsoft 365 Defender Portal

unknown confidence

Microsoft Defender Device Control

unknown confidence

Microsoft Defender Exploit Guard

unknown confidence

Microsoft Defender For Cloud Apps

unknown confidence

Microsoft Defender For Cloud

unknown confidence

Microsoft Defender For Endpoint API

unknown confidence

Microsoft Defender For Endpoint

unknown confidence

Microsoft Defender For Identity

unknown confidence

Microsoft Defender For Office 365

unknown confidence

Microsoft Defender For Storage

unknown confidence

Microsoft Defender Portal

unknown confidence

Microsoft Dsrm

unknown confidence

Microsoft Entra Admin Center

unknown confidence

Microsoft Entra Id Conditional Access

unknown confidence

Microsoft Entra Id Governance

unknown confidence

Microsoft Entra Id Protection

unknown confidence

Microsoft Graph And Audit Logs

unknown confidence

Microsoft Graph API Audit Logs

unknown confidence

Microsoft Graph API To Detect Email Forwarding Rule Creation

unknown confidence

Microsoft Graph API

unknown confidence

Microsoft Graph Powershell Sdk

unknown confidence

Microsoft Graph Security API

unknown confidence

Microsoft Intune

unknown confidence

Microsoft Laps

unknown confidence

Microsoft Nps

unknown confidence

Microsoft Presidio

unknown confidence

Microsoft Purview Compliance Portal

unknown confidence

Microsoft Purview Dlp

unknown confidence

Microsoft Purview

unknown confidence

Microsoft Security Compliance Toolkit

unknown confidence

Microsoft Sentinel Ueba

unknown confidence

Microsoft Sentinel Workbooks

unknown confidence

Microsoft Sentinel

unknown confidence

Microsoft Threat Intelligence

unknown confidence

Microsoft Word

unknown confidence

Mimikatz Lsadump

high confidence

mimikatz

Open‑source Windows security research tool by Benjamin Delpy (gentilkiwi) best known for extracting credentials from memory and manipulating authentication artifacts (e.g., LSASS contents, Kerberos tickets) and performing directory replication–based credential access (DCSync).

unknown confidence

Minio

unknown confidence

Mips

unknown confidence

Misconfigurations

unknown confidence

Misp Correlation Engine

unknown confidence

Misp

unknown confidence

Mitigations

unknown confidence

Mitm6

unknown confidence

Mitmproxy

unknown confidence

MITRE Att Ck Groups

unknown confidence

MITRE Att Ck Navigator

unknown confidence

MITRE Att Ck

unknown confidence

MITRE Att

unknown confidence

MITRE Caldera

unknown confidence

Mitreattack Python

unknown confidence

Mixers

unknown confidence

Mmls

unknown confidence

Mobsf

unknown confidence

Modbus

unknown confidence

Modifying

unknown confidence

Modsecurity

unknown confidence

Module

unknown confidence

Modules

unknown confidence

Moneta

unknown confidence

Mongodb Shell

unknown confidence

Monitoring

unknown confidence

Mozilla Observatory

unknown confidence

Mschapv2

unknown confidence

Msrpc

unknown confidence

Multi Step Attack Chains Beyond Single Atomic Tests

unknown confidence

Mutation

unknown confidence

Mxtoolbox

unknown confidence

Mythic

unknown confidence

Mzcacheview

unknown confidence

Ndiff

unknown confidence

Ndpmon

unknown confidence

Nemesis

unknown confidence

Neo4j

unknown confidence

Nessus Expert

unknown confidence

Nessus Professional

unknown confidence

Nessus

unknown confidence

Netbox

unknown confidence

Netflow

unknown confidence

Netgate Autoconfigbackup

unknown confidence

Netskope Casb

unknown confidence

Netskope

unknown confidence

Network Capture

unknown confidence

Network Captures

unknown confidence

Network Flows

unknown confidence

Networking

unknown confidence

Networkminer

unknown confidence

New Dlpcompliancerule

unknown confidence

Newman Reporter Htmlextra

unknown confidence

Newman

unknown confidence

Nextdns

unknown confidence

Nfc

unknown confidence

Ngrep

unknown confidence

Nightfall Ai

high confidence

Nikto

Nikto is a Perl-based web server scanner that performs tests for dangerous files/CGIs, outdated server software, and common misconfigurations, producing machine- and human-readable reports.

unknown confidence

Nist 800 53

unknown confidence

Nist Csf

unknown confidence

Nist

unknown confidence

Nitro Cli

unknown confidence

Nitro Enclaves Acm

unknown confidence

Nmap 7 90

unknown confidence

Nmap Parse Output

unknown confidence

Nmap With Ot Scripts

high confidence

Nmap

Nmap is a widely used, open-source scanner for network exploration and security auditing that discovers hosts, enumerates open ports and services, identifies software/OS fingerprints, and supports extensible scripting for higher-level checks.

unknown confidence

No More Ransom Project

unknown confidence

No More Ransom

unknown confidence

Node Js Vm Module

unknown confidence

Node Js

unknown confidence

Nodejs

unknown confidence

Nomoreransom Org

unknown confidence

None Bypass

unknown confidence

Nosql

unknown confidence

Nosqli

unknown confidence

Nosqlmap

unknown confidence

Notation

unknown confidence

Now Deprecated

unknown confidence

Nozomi Guardian

unknown confidence

Nozomi Networks Guardian

unknown confidence

Nozomi

unknown confidence

Nping

unknown confidence

Npm Audit

unknown confidence

Npm Download Counts API

unknown confidence

Npm Registry API

unknown confidence

Nrf52840 Usb Dongle Nrf Sniffer

unknown confidence

Nsrl

unknown confidence

Nsurlsession

unknown confidence

Ntfs Log Tracker

unknown confidence

Ntlm Hashes

unknown confidence

Ntlmrelayx

unknown confidence

Ntlmssp Authentication

unknown confidence

Nuclei

unknown confidence

Nudge Security

unknown confidence

Nvdlib

unknown confidence

Nvidia Nemo Guardrails

unknown confidence

Nxlog

unknown confidence

Oauth Tools Com

unknown confidence

Oauth2 Security Tester

unknown confidence

Obfuscator

unknown confidence

Objection

unknown confidence

Ofac Sdn List

unknown confidence

Offense Management

unknown confidence

Offense Operations

unknown confidence

Okta Advanced Server Access

unknown confidence

Okta Device Trust

unknown confidence

Okta Identity Engine

unknown confidence

Okta Identity Governance

unknown confidence

Okta Workflows

unknown confidence

Okta

unknown confidence

Oledump Py

unknown confidence

Oletools

unknown confidence

Ollama

unknown confidence

One Class Svm

unknown confidence

One Identity Manager

unknown confidence

Opa

unknown confidence

Opc Ua

unknown confidence

Opc

unknown confidence

Open Policy Agent

unknown confidence

Open Ports

unknown confidence

Openai Guardrails Python

unknown confidence

Openapi Specifications And JSON Schema To Enforce Input

unknown confidence

Opencanary

unknown confidence

Opencti Graph

unknown confidence

Opencti Reports

unknown confidence

Opencti

unknown confidence

Openpgp

unknown confidence

Openplc

unknown confidence

Openredirex

unknown confidence

Openscap

unknown confidence

Openssl

unknown confidence

Openstego

unknown confidence

Opentaxii

unknown confidence

Openvas

unknown confidence

Openvpn

unknown confidence

Or External Remediation Systems

unknown confidence

Or In Memory Stores

unknown confidence

Or Organization

unknown confidence

Or Public Key

unknown confidence

Or Route Alerts Based On Enrichment Results

unknown confidence

Or Third Party Analytics

unknown confidence

Organized By Technique Id

unknown confidence

Os Detection

unknown confidence

Os Version

unknown confidence

Osint Framework

unknown confidence

Osisoft Pi Server

unknown confidence

Ospf

unknown confidence

Osquery Go

unknown confidence

Osquery

unknown confidence

Ossec

unknown confidence

Otool

unknown confidence

Overprivileged Roles

unknown confidence

Owasp Dependency Check

unknown confidence

Owasp Dependency Track

unknown confidence

Owasp Llm Top 10

unknown confidence

Owasp Risk Rating Methodology To Separate True Positives From False Positives And Prioritize Remediation

unknown confidence

Owasp Serverless Top 10

unknown confidence

Owasp Threat Dragon

unknown confidence

Owasp Zap

unknown confidence

Oxml Xxe

unknown confidence

Oxt Me

unknown confidence

Packet Parsing

unknown confidence

Packetfence

unknown confidence

Pacu

unknown confidence

Pagerduty

unknown confidence

Palantir Wef Configuration

unknown confidence

Palo Alto Iot

unknown confidence

Palo Alto Networks Ngfw

unknown confidence

Palo Alto Ngfw

unknown confidence

Palo Alto Xsoar

unknown confidence

Palo Alto

unknown confidence

Param Miner

unknown confidence

Parameter Fuzzing

unknown confidence

Parasite6

unknown confidence

Parsing

unknown confidence

Passivedns

unknown confidence

Password Rotation

unknown confidence

Payloads

unknown confidence

Payloadsallthethings

unknown confidence

Pci Dss

unknown confidence

Pdf Parser Py

unknown confidence

Pdf Parser

unknown confidence

Pdfid Py

unknown confidence

Pdfid

unknown confidence

Pdfs

unknown confidence

Pe Bear

unknown confidence

Pe Sieve

unknown confidence

Peap

unknown confidence

Pecmd

unknown confidence

Peepdf 3

unknown confidence

Peepdf

unknown confidence

Pefile

unknown confidence

Persistence

unknown confidence

Persistencesniper

unknown confidence

Pestudio

unknown confidence

Pfblockerng

unknown confidence

Pfsense 2 7

unknown confidence

Pfsense

unknown confidence

Pg Restore

unknown confidence

Phishtool

unknown confidence

Photorec

unknown confidence

Php Interactive Shell

unknown confidence

Phpggc

unknown confidence

Phpstan

unknown confidence

Pi Vision

unknown confidence

Pingcastle

unknown confidence

Pip Audit

unknown confidence

Pir Tracking

unknown confidence

Piv

unknown confidence

Pkce

unknown confidence

Pkcs 11 Interface For Cryptographic Key Management

unknown confidence

Plaso

unknown confidence

Plcinject

unknown confidence

Plus Repeater And Intruder For Manual Payload Testing

unknown confidence

Policies

unknown confidence

Policy Analyzer

unknown confidence

Popularity

unknown confidence

Port Scanning

unknown confidence

Port Security

unknown confidence

Port

unknown confidence

Postgresql For Siem Integration

unknown confidence

Postman Collection Runner

unknown confidence

Postman Flows

unknown confidence

Postman

unknown confidence

Posture Assessment

unknown confidence

Posture

unknown confidence

Power Bi

unknown confidence

Powerpc Architectures Common In Plcs

unknown confidence

Powershell Get Mppreference

unknown confidence

Powershell Get Wmiobject

unknown confidence

Powershell Logging

unknown confidence

Powershell

unknown confidence

Ppfuzz

unknown confidence

Praat

unknown confidence

Pre Commit

unknown confidence

Prefetch Hash Calculator

unknown confidence

Prelude Operator

unknown confidence

Principal Mapper

unknown confidence

Printspoofer

unknown confidence

Prioritization

unknown confidence

Prisma Access

unknown confidence

Privilege Escalation Vectors

unknown confidence

Privilege Escalation

unknown confidence

Privileged Access Management

unknown confidence

Process Hacker

unknown confidence

Process Kill

unknown confidence

Process Monitor

unknown confidence

Process Trees

unknown confidence

Processes

unknown confidence

Processmitigations Powershell

unknown confidence

Proofpoint Tap

unknown confidence

Proofpoint

unknown confidence

Protectai

unknown confidence

Prototype Pollution Gadgets Scanner

unknown confidence

Prowler Azure

unknown confidence

Prowler

unknown confidence

Psfalcon

unknown confidence

Psort

unknown confidence

Psutil

unknown confidence

Ptes Methodology

unknown confidence

Public Access

unknown confidence

Pulledpork 3

unknown confidence

Py Webauthn

unknown confidence

Pybgpstream

unknown confidence

Pycryptodome

unknown confidence

Pyelftools

unknown confidence

Pyjwt

unknown confidence

Pymisp

unknown confidence

Pymodbus

unknown confidence

Pypi JSON API

unknown confidence

Pypistats Org API

unknown confidence

Pypykatz

unknown confidence

Pysigma

unknown confidence

Pyspf

unknown confidence

Pytector

unknown confidence

Python Cryptography Library For Certificate Generation And Ssl Module For TLS Verification Validates Certificate Chains

unknown confidence

Python Evtx

unknown confidence

Python Fido2

unknown confidence

Python Levenshtein

unknown confidence

Python Pandas For Statistical Analysis

unknown confidence

Python Pandas For Traffic Pattern Analysis And Domain Classification

unknown confidence

Python Prefetch

unknown confidence

Python Registry

unknown confidence

Python Threading

unknown confidence

Python Watchdog For Real Time Filesystem Monitoring

unknown confidence

Python Websockets

unknown confidence

Python

unknown confidence

Qpdf

unknown confidence

Qradar API

unknown confidence

Qradar Assistant

unknown confidence

Qradar Pulse

unknown confidence

Qradar Use Case Manager

unknown confidence

Qradar

unknown confidence

Qualys Vmdr

unknown confidence

Queryable Via The Rfc 6962 API At Their Respective Log Urls

unknown confidence

Querying Status

unknown confidence

Quota Management

unknown confidence

Rabin2

unknown confidence

Racepwn

unknown confidence

Radare2

unknown confidence

Rakkess

unknown confidence

Ransomware Readiness Assessment

unknown confidence

Rapid7 Insightvm

unknown confidence

Rapidfuzz

unknown confidence

Rate Limiting

unknown confidence

Rbac Tool

unknown confidence

Rbndr Us

unknown confidence

Rclone

unknown confidence

Rdp

unknown confidence

Reactor

unknown confidence

Reading Uefi Variables

unknown confidence

Rebinder Net

unknown confidence

Rebuff

unknown confidence

Recmd

unknown confidence

Recon Ng

unknown confidence

Recorded Future Dark Web Module

unknown confidence

Recorded Future Threat Intelligence

unknown confidence

Recorded Future

unknown confidence

Redirect Chains

unknown confidence

Redis

unknown confidence

Register Addresses

unknown confidence

Registry Changes

unknown confidence

Registry Explorer

unknown confidence

Registry

unknown confidence

Regripper For Windows Artifacts

unknown confidence

Regripper

unknown confidence

Regulatory Compliance

unknown confidence

Rekall

unknown confidence

Rekor Cli

unknown confidence

Rekor

unknown confidence

Relativity

unknown confidence

Replaced By Intune

unknown confidence

Repos

unknown confidence

Requests

unknown confidence

Resemblyzer

unknown confidence

Resources

medium confidence

Responder

Open-source LLMNR/NBT-NS/mDNS poisoner and rogue authentication servers used to coerce and capture Windows network credentials and facilitate NTLM relay in Active Directory environments.

unknown confidence

Restic

unknown confidence

Resticpy

unknown confidence

Restler

unknown confidence

Results

unknown confidence

Retire Js

unknown confidence

Retirejs

unknown confidence

Reverse Lookup

unknown confidence

Risk Based Alerting

unknown confidence

Rita

unknown confidence

Rkhunter

unknown confidence

Roles

unknown confidence

Ropgadget

unknown confidence

Rotation

unknown confidence

Route Leaks

unknown confidence

Routinator

unknown confidence

Rpki

unknown confidence

Rsyslog

unknown confidence

Rtu

unknown confidence

Rubeus

unknown confidence

Rubrik Instant Recovery

unknown confidence

Rubrik Security Cloud

unknown confidence

Rubrik

unknown confidence

Rule Compilation

unknown confidence

Rule

unknown confidence

Runtime Errors

unknown confidence

S3 Storage Lens

unknown confidence

S3

unknown confidence

S3audit

unknown confidence

S4u2self And S4u2proxy Extensions For Lateral Movement And Privilege Escalation

unknown confidence

S7comm

unknown confidence

Safe Attachments

unknown confidence

Sailpoint Identityiq

unknown confidence

Sailpoint Rest API

unknown confidence

Sailpoint

unknown confidence

Samhain

unknown confidence

Saml Azure Ad

unknown confidence

Sandbox Reports

unknown confidence

Sans Picerl Framework

unknown confidence

Sarif Viewer

unknown confidence

Sasquatch

unknown confidence

Saviynt Enterprise Identity Cloud

unknown confidence

Saviynt

unknown confidence

Sbecmd And Shellbags Explorer

unknown confidence

Scalpel

unknown confidence

Scanning

unknown confidence

Scapy

unknown confidence

Scdbg

unknown confidence

Scheduled Tasks

unknown confidence

Schema Analysis

unknown confidence

Schemathesis

unknown confidence

Scikit Learn

unknown confidence

Scirius

unknown confidence

Scorecard

unknown confidence

Scoutsuite

unknown confidence

Scripting Tests

unknown confidence

Scylla

unknown confidence

Search Engines

unknown confidence

Searchable By Identity

unknown confidence

Searchable By Ip

unknown confidence

Seclists

unknown confidence

Secret Scanning

unknown confidence

Secret Server Rest API

unknown confidence

Secret Server Sdk

unknown confidence

Secretfinder

unknown confidence

Secretsdump Py

unknown confidence

Sections

unknown confidence

Secure Boot

unknown confidence

Secure

unknown confidence

Security Command Center

unknown confidence

Security Compliance Powershell

unknown confidence

Securityheaders Com

unknown confidence

Securityheaders

unknown confidence

Securonix

unknown confidence

Segment

unknown confidence

Sel 3620 Ethernet Security Gateway

unknown confidence

Semgrep

unknown confidence

Sentinel

unknown confidence

Sentinelone

unknown confidence

Server Side Prototype Pollution

unknown confidence

Service Accounts

unknown confidence

Service Enumeration

unknown confidence

Service Principal Names

unknown confidence

Servicenow Itsm

unknown confidence

Servicenow Performance Analytics

unknown confidence

Servicenow

unknown confidence

Session Controls

unknown confidence

Session Recording

unknown confidence

Set Label

unknown confidence

Set

unknown confidence

Setting Pins

unknown confidence

Sha256sum

unknown confidence

Share Enumeration

unknown confidence

Shares

unknown confidence

Shellbags Explorer

unknown confidence

Sherlock

unknown confidence

Shodan

unknown confidence

Siem Pipelines Use When Building Kernel Level Runtime Security Observability For Linux Hosts Or Kubernetes Clusters

unknown confidence

Siem Platforms Activates For Requests Involving Auditd Analysis

unknown confidence

Siem Splunk

unknown confidence

Siemens Productcert

unknown confidence

Siemens Sinema Remote Connect

unknown confidence

Siga Ot Solutions

unknown confidence

Sigcheck

unknown confidence

Sigfind

unknown confidence

Sigma Rules

unknown confidence

Sigma

unknown confidence

Sigmahq

unknown confidence

Sigstore Policy Controller

unknown confidence

Sigstore

unknown confidence

Single Packet Authorization

unknown confidence

Singularity

unknown confidence

Slither And Mythril To Detect Reentrancy

unknown confidence

Sliver Framework

unknown confidence

Sliver

unknown confidence

Smartassembly

unknown confidence

Smartctl

unknown confidence

Smbclient

unknown confidence

Smtp

unknown confidence

Smtp4dev

unknown confidence

Smtplib

unknown confidence

Smuggler Py

unknown confidence

Sniffer

unknown confidence

Snorby

unknown confidence

Snort 3

unknown confidence

Snort Rules

unknown confidence

Snort

unknown confidence

Sns

unknown confidence

Snyk Advisor

unknown confidence

Snyk Cli

unknown confidence

Snyk Iac

unknown confidence

Snyk Open Source

unknown confidence

Snyk

unknown confidence

Soc 2 With Policy As Code

unknown confidence

Socket Io Client

unknown confidence

Sod Violation Summaries

unknown confidence

Software

unknown confidence

Spectral Feature Extraction

unknown confidence

Speechbrain

unknown confidence

Spi

unknown confidence

Spiderfoot

unknown confidence

Splunk Attack Analyzer

unknown confidence

Splunk Cim

unknown confidence

Splunk Dashboard Studio

unknown confidence

Splunk Enterprise Security

unknown confidence

Splunk Enterprise

unknown confidence

Splunk Es Adaptive Response

unknown confidence

Splunk Es Risk Based Alerting

unknown confidence

Splunk Es

unknown confidence

Splunk Itsi

unknown confidence

Splunk Soar Rest API To Create Containers

unknown confidence

Splunk Soar

unknown confidence

Splunk Spl

unknown confidence

Splunk Stream

unknown confidence

Splunk Uba

unknown confidence

Splunk With Cip Content Pack

unknown confidence

Splunk

unknown confidence

Spycloud

unknown confidence

Sql Queries

unknown confidence

Sqlite3

high confidence

sqlmap

sqlmap is an automated framework for detecting and exploiting SQL injection vulnerabilities in web applications and services, with extensive DBMS fingerprinting, data enumeration, and post-exploitation capabilities.

unknown confidence

Ssdt Analysis

unknown confidence

SSH And Logs Access Attempts

unknown confidence

Ssl Certificate

unknown confidence

Ssl From Live Or Captured Traffic

unknown confidence

Ssl Kill Switch2

unknown confidence

Ssl Suitable For Hunting

unknown confidence

Sslstrip

unknown confidence

Sslstrip2

unknown confidence

Sslunpinning

unknown confidence

Ssm Automation

unknown confidence

Sspm Tools

unknown confidence

Ssrf

unknown confidence

Ssrfmap

unknown confidence

Sstimap

unknown confidence

Ssvc Framework

unknown confidence

Starting Activities

unknown confidence

Status Checking

unknown confidence

Steampipe

unknown confidence

Steghide

unknown confidence

Stegoveritas

unknown confidence

Stegseek

unknown confidence

Stegsolve

unknown confidence

Stepsecurity Harden Runner

unknown confidence

Stix 2 1

unknown confidence

Stix2

unknown confidence

Storage

unknown confidence

Storing

unknown confidence

Stp

unknown confidence

Strace

unknown confidence

Strata Cloud Manager

unknown confidence

Stream Decompression

unknown confidence

Stream Reassembly

unknown confidence

Streams Exe

unknown confidence

Strings

unknown confidence

Styra Das

unknown confidence

Subdomains

unknown confidence

Subfinder

unknown confidence

Subjack

unknown confidence

Subprocess With Shell True

unknown confidence

Superseded By Scc But Still Referenced In Compliance Frameworks

unknown confidence

Supporting Levenshtein

unknown confidence

Supporting Multi Turn Dialog Control

unknown confidence

Suppress

unknown confidence

Surebackup Verification

unknown confidence

Suricata 7 0

unknown confidence

Suricata Update

unknown confidence

Suricata With Et Open Ics Rules

unknown confidence

Suricata

unknown confidence

Suspicious Files

unknown confidence

Swagger Codegen

unknown confidence

Swagger Ui Detector

unknown confidence

Swaks

unknown confidence

Swg

unknown confidence

Syft

unknown confidence

Symantec Dlp

unknown confidence

Sysdig

unknown confidence

Sysinternals Autoruns

unknown confidence

Sysinternals Handle

unknown confidence

Sysinternals Rootkitrevealer

unknown confidence

Sysinternals Suite

unknown confidence

Sysmon Event Id 10

unknown confidence

Sysmon Event Ids 8 And 10 And Edr Process Telemetry

unknown confidence

Sysmon V13

unknown confidence

Sysmon

unknown confidence

T Pot

unknown confidence

Tabletop Exercise Framework

unknown confidence

Tabletop Scenarios

unknown confidence

Tag Immutability

unknown confidence

Task Tracking

unknown confidence

Taxii2 Client

unknown confidence

Tc

unknown confidence

Tcp

high confidence

tcpdump

A command-line packet capture and analyzer that uses libpcap to sniff, filter, display, and save network traffic in pcap/pcapng formats for security investigation and troubleshooting.

unknown confidence

Tcpreplay

unknown confidence

Tenable Io

unknown confidence

Tenable Nessus

unknown confidence

Tenable Ot Security To Identify Vulnerabilities Without Disrupting Industrial Processes Or Crashing Legacy Controllers

unknown confidence

Terrascan

unknown confidence

Testdisk

unknown confidence

Testing

unknown confidence

Testssl Sh

unknown confidence

Tetragon

unknown confidence

Tfsec

unknown confidence

Thc Ipv6 Toolkit

unknown confidence

The Sleuth Kit

high confidence

theHarvester

theHarvester is an open‑source reconnaissance tool used to passively and selectively actively enumerate emails, subdomains/hosts, IPs and related URLs for a target domain using multiple public data sources.

unknown confidence

Thehive Cortex

unknown confidence

Thehive

unknown confidence

Then Live Migrates To Production

unknown confidence

Then Replay With Regular User Token To Test Function Level Authorization

unknown confidence

Thinkst Canary

unknown confidence

Thread Stacks

unknown confidence

Threat Detection

unknown confidence

Threat Intelligence Framework

unknown confidence

Threatconnect Reports

unknown confidence

Threatconnect Tc Exchange

unknown confidence

Threatconnect

unknown confidence

Threatfox

unknown confidence

Tidal Cyber

unknown confidence

Timeline Explorer

unknown confidence

Timeline

unknown confidence

Timesketch

unknown confidence

Timestomping

unknown confidence

Tines

unknown confidence

Tldextract

unknown confidence

Tofino Xenon

unknown confidence

Tofino

unknown confidence

Token Renewal

unknown confidence

Tooling

unknown confidence

Toxicity

unknown confidence

Tplmap

unknown confidence

Tracking Reviewer Progress

unknown confidence

Trellix

unknown confidence

Trend Analysis

unknown confidence

Triggering Behavioral Alerts On Canary Modification

unknown confidence

Tripwire Enterprise

unknown confidence

Tripwire

unknown confidence

Trivy Action

unknown confidence

Trivy Operator

unknown confidence

Trivy

unknown confidence

Troubleshooting

unknown confidence

Trufflehog V3

unknown confidence

Trufflehog

unknown confidence

Trunking

unknown confidence

Trustkit

unknown confidence

Tshark

unknown confidence

Ttl

unknown confidence

Turbo Intruder

unknown confidence

U2f

unknown confidence

Ubertooth One Ubertooth Btle

unknown confidence

Udp

unknown confidence

Ueba

unknown confidence

Uefitool

unknown confidence

Uncoder Io

unknown confidence

Unified Audit Log

unknown confidence

Unsquashfs

unknown confidence

Upload Timestamps

unknown confidence

Uploading

unknown confidence

Upx

unknown confidence

Url Categorization And Risk Based Routing

unknown confidence

Url Inspection

unknown confidence

Url

unknown confidence

Urls

unknown confidence

Urlscan Io

unknown confidence

Urlscan

unknown confidence

Usb C

unknown confidence

Usb Forensic Tracker

unknown confidence

Usbdeview

unknown confidence

Useful For Observing Injection Sequences In Real Time

unknown confidence

Users

unknown confidence

Using Error Based Field Discovery

unknown confidence

Valence Security For Saas Configuration Monitoring

unknown confidence

Varnish Cli

unknown confidence

Varnishlog

unknown confidence

Vault Agent Injector

unknown confidence

Vault Agent

unknown confidence

Vault Csi Provider

unknown confidence

Vault Radar

unknown confidence

Vault Secrets Operator

unknown confidence

Vb Net

unknown confidence

Vector Similarity

unknown confidence

Vectr

unknown confidence

Veeam Backup Replication 12

unknown confidence

Veeam Backup Replication

unknown confidence

Veeam Instant Recovery

unknown confidence

Veeam

unknown confidence

Velero

unknown confidence

Velociraptor

unknown confidence

Verify Registration Response

unknown confidence

Verifying Chains

unknown confidence

Verifying Firmware Write Protection

unknown confidence

Verifying Signatures

unknown confidence

Verifying

unknown confidence

Version History

unknown confidence

Version Probing

unknown confidence

Versions

unknown confidence

Vipermonkey

unknown confidence

Virustotal Integration

unknown confidence

Virustotal

unknown confidence

Visualization

unknown confidence

Vmware Workspace One

high confidence

Volatility (Volatility Framework)

Volatility is a Python-based framework for extracting and analyzing digital artifacts from volatile memory snapshots across Windows, Linux, and macOS; Volatility 3 is a modern rewrite that uses symbol tables instead of static profiles and a layered architecture to parse diverse memory image formats.

unknown confidence

Volatility3 Linux Plugins

unknown confidence

Volatility3 Plugins To Identify Nop Sled Patterns

unknown confidence

Volatility3 Plugins

unknown confidence

Vpc Flow Logs

unknown confidence

Vql Queries

unknown confidence

Vtp

unknown confidence

Vulnerability Assessment

unknown confidence

Vulnerability Findings

unknown confidence

Vulnerability Management

unknown confidence

Vulnerability Scanning

unknown confidence

Vulnerability Tracking

unknown confidence

Waf Bypass Com

unknown confidence

Waf Integration

unknown confidence

Waf Logs

unknown confidence

Waf Security Automations

unknown confidence

Wafw00f

unknown confidence

Walletexplorer

unknown confidence

Warp Client

unknown confidence

Watchdog

unknown confidence

Waterfall Security Solutions

unknown confidence

Waterfall Security Unidirectional Gateway

unknown confidence

Waterfall Security

unknown confidence

Wayback Machine

unknown confidence

Wazuh

unknown confidence

Wdac Wizard

unknown confidence

Wdac

unknown confidence

Web Cache Vulnerability Scanner

unknown confidence

Web Scraping

unknown confidence

Webauthn Io

unknown confidence

Webhook Site

unknown confidence

Websocat

high confidence

Wfuzz

Wfuzz is a Python-based web fuzzer that injects payloads into HTTP requests to discover endpoints, parameters, and behaviors, and to triage responses using flexible filters and output formats.

unknown confidence

Whois

unknown confidence

Wildfire

unknown confidence

Window Size

unknown confidence

Windows Event Forwarding

unknown confidence

Windows Event Viewer

unknown confidence

Windows Exploit Protection

unknown confidence

Windows Scheduled Tasks By Analyzing Task Creation Events

unknown confidence

Windows Security Event Logs

unknown confidence

Winlogbeat

high confidence

WinPEAS

WinPEAS is an open-source Windows host enumeration tool that scans for misconfigurations, weak permissions, and environmental clues that could enable local privilege escalation during penetration testing and red-team assessments.

unknown confidence

Winpmem

unknown confidence

Winprefetchview

unknown confidence

Winrm

unknown confidence

Wireguard

unknown confidence

Wireshark 4 0

unknown confidence

Wireshark Modbus Dissector

unknown confidence

Wireshark With Iec 61850 Dissector

high confidence

Wireshark

Wireshark is an open-source network protocol analyzer for capturing and interactively analyzing packet data from live interfaces or capture files, with a companion CLI (TShark) and a capture utility (dumpcap).

unknown confidence

With Llm01 Dedicated To Prompt Injection

unknown confidence

Wmi Events

unknown confidence

Wmi Explorer

unknown confidence

Wmi Subscriptions

unknown confidence

Wmi

unknown confidence

Wmiexec

unknown confidence

Word Docs

unknown confidence

Wpa Supplicant

unknown confidence

Wscat

unknown confidence

Wsus

unknown confidence

X Ways Forensics

unknown confidence

X25519mlkem768

unknown confidence

X64dbg

unknown confidence

X86 64

unknown confidence

Xenon

unknown confidence

Xlmdeobfuscator

unknown confidence

Xm Cyber

unknown confidence

Xmllint

unknown confidence

Xsrfprobe

unknown confidence

Xss Hunter

unknown confidence

Xsstrike

unknown confidence

Xxeinjector

unknown confidence

Xxeserv

unknown confidence

Yara Matching

unknown confidence

Yara Python

unknown confidence

Yara Rules

unknown confidence

Yara

unknown confidence

Yargen

unknown confidence

Yarp

unknown confidence

Yersinia

unknown confidence

Yeti

unknown confidence

Ysoserial Net

unknown confidence

Ysoserial

unknown confidence

Yubico Authenticator

unknown confidence

Yubikey 5 Series

unknown confidence

Zaproxy

unknown confidence

Zeek 6 0

unknown confidence

Zeek Conn Log And Netflow Analysis

unknown confidence

Zeek Cut

unknown confidence

Zeek Modbus Analyzer

unknown confidence

Zeek With Ot Plugins

unknown confidence

Zeek

unknown confidence

Zeekctl

unknown confidence

Zenmap

unknown confidence

Zpa Admin Portal

unknown confidence

Zpa App Connector

unknown confidence

Zpa Log Streaming Service

unknown confidence

Zscaler Client Connector

unknown confidence

Zscaler Private Access

unknown confidence

Zscaler Zpa

unknown confidence

Zscaler

unknown confidence

Zsteg

unknown confidence

Ztna Connector