Pocket atlas companion
Cyber Research Wiki
A generated encyclopedia of cybersecurity tools, built from the same source pipeline as the Pocket Atlas app and published as a static GitHub Pages site.
700 Integrations
unknown confidenceAaronlocker
unknown confidenceAbuse Ch
unknown confidenceAbuseipdb
unknown confidenceAc Hunter
unknown confidenceAccess Certifications
unknown confidenceAccess Context Manager
unknown confidenceAccess Control
unknown confidenceAccess For Infrastructure
unknown confidenceAccess Governance
unknown confidenceAccess Levels
unknown confidenceAccess Metrics
unknown confidenceAccess Reviews
unknown confidenceAcls
unknown confidenceActionlint
unknown confidenceActivity Log
unknown confidenceAdaptive Shield
unknown confidenceAdb
unknown confidenceAdmincount
unknown confidenceAff
unknown confidenceAfl
unknown confidenceAgent
unknown confidenceAi
unknown confidenceAide
unknown confidenceAircrack Ng And Related Tools
high confidenceAircrack-ng Suite
A collection of command-line tools for monitoring, testing, and auditing Wi‑Fi networks, including packet capture, frame injection, and offline key recovery for WEP and WPA/WPA2‑PSK.
unknown confidenceAireplay Ng
unknown confidenceAkamai Guardicore Segmentation
unknown confidenceAkto
unknown confidenceAlb
unknown confidenceAleapp
unknown confidenceAlienvault Otx
unknown confidenceAllows Message Modification And Replay
unknown confidenceAllstar
unknown confidenceAltair Graphql Client
high confidenceOWASP Amass
OWASP Amass is a framework for mapping internet-exposed assets and attack surfaces using OSINT and optional active reconnaissance, correlating results into a unified asset graph for analysis and tracking.
unknown confidenceAmazon Athena
unknown confidenceAmazon Detective
unknown confidenceAmazon Eventbridge
unknown confidenceAmazon Guardduty
unknown confidenceAmazon Macie
unknown confidenceAmazon Security Lake
unknown confidenceAmcacheparser
unknown confidenceAmsi
unknown confidenceAnalyzemft
unknown confidenceAnalyzing
unknown confidenceAnd 802 1q Attacks With Both Gui And Cli Modes
unknown confidenceAnd Abuseipdb
unknown confidenceAnd Access Policies
unknown confidenceAnd Adaptive Access Policies
unknown confidenceAnd Air Gapped Recovery
unknown confidenceAnd Aircrack Ng
unknown confidenceAnd Allowed Requests
unknown confidenceAnd Analyzing Embedded File Systems And Compressed Data In Firmware Images
unknown confidenceAnd Analyzing Embedded Firmware Images
unknown confidenceAnd Anomaly Detection For Industrial Environments
unknown confidenceAnd API Activity
unknown confidenceAnd API Analytics
unknown confidenceAnd API Discovery
unknown confidenceAnd Application Access Management
unknown confidenceAnd Appsync Endpoints
unknown confidenceAnd Appsync
unknown confidenceAnd Aql Query Engine
unknown confidenceAnd Ascii Modes Used For Building Custom Modbus Clients
unknown confidenceAnd Attaching Attestations Using Sigstore Keyless Signing Or Traditional Key Based Signing
unknown confidenceAnd Attack Generation With Support For Schema Brute Forcing
unknown confidenceAnd Attesting Container Images With Key Based Or Keyless Workflows
unknown confidenceAnd Audit Logs
unknown confidenceAnd Authentication
unknown confidenceAnd Automated Extraction Of Embedded Files
unknown confidenceAnd Automated Provisioning
unknown confidenceAnd Automated Recovery Orchestration
unknown confidenceAnd Automating Scope Reviews
unknown confidenceAnd Azure Ad Integration
unknown confidenceAnd Bacnet Protocol Analyzers For Baseline Building
unknown confidenceAnd Bacnet
unknown confidenceAnd Banner Information For Ip Enrichment
unknown confidenceAnd Beacon Detection Queries
unknown confidenceAnd Biometrics For Ot Access Verification
unknown confidenceAnd Breakpoint Capabilities
unknown confidenceAnd Campaign Analysis
unknown confidenceAnd Campaign Linkages
unknown confidenceAnd Canary Tokens
unknown confidenceAnd Canvas For Security Dashboards
unknown confidenceAnd Case Management
unknown confidenceAnd Certificate Detail Retrieval
unknown confidenceAnd Certificate Transparency Log Analysis
unknown confidenceAnd Certificate Validation
unknown confidenceAnd Characteristic Read
unknown confidenceAnd Ci
unknown confidenceAnd Cloud Configurations
unknown confidenceAnd Cloud Infrastructure Assessment
unknown confidenceAnd Cloud Modules
unknown confidenceAnd Cloud Storage
unknown confidenceAnd Code Analysis
unknown confidenceAnd Collaborative War Room
unknown confidenceAnd Command Execution Across Windows Networks
unknown confidenceAnd Command Injection
unknown confidenceAnd Community Comments
unknown confidenceAnd Comparing Module Guids
unknown confidenceAnd Comparing Responses Across Authentication Contexts
unknown confidenceAnd Compiler Information
unknown confidenceAnd Compliance Checks
unknown confidenceAnd Compliance Monitoring
unknown confidenceAnd Compliance Reporting
unknown confidenceAnd Compliance Scoring
unknown confidenceAnd Connection Logs For Lateral Movement Analysis
unknown confidenceAnd Connector Configuration
unknown confidenceAnd Content Analysis
unknown confidenceAnd Content Search
unknown confidenceAnd Continuous Threat Detection Platform
unknown confidenceAnd Converting Between Capture File Formats
unknown confidenceAnd Counted Requests
unknown confidenceAnd Coverage Over Time
unknown confidenceAnd Credential Capture
unknown confidenceAnd Credential Sniffing With A Modular Architecture
unknown confidenceAnd Credential Sniffing
unknown confidenceAnd Credentials From Pcap Files
unknown confidenceAnd Custom Rule Sources
unknown confidenceAnd Custom Workflows
unknown confidenceAnd Dashboard
unknown confidenceAnd Data Access Opportunities
unknown confidenceAnd Data Exfiltration
unknown confidenceAnd Data Source Integration
unknown confidenceAnd Debugger Supporting C And Vb Net Decompilation
unknown confidenceAnd Dependency Review In Github
unknown confidenceAnd Deploys Rulesets With Policy Based Filtering
unknown confidenceAnd Detailed Analytics
unknown confidenceAnd Detecting Suspicious Keywords And Iocs
unknown confidenceAnd Device Compromise
unknown confidenceAnd Device Registration
unknown confidenceAnd Distributing Iocs
unknown confidenceAnd Distribution Info
unknown confidenceAnd Distribution
unknown confidenceAnd Dlp Policy Enforcement
unknown confidenceAnd DNS Databases
unknown confidenceAnd DNS Tokens
unknown confidenceAnd Dockerfile
unknown confidenceAnd Documenting Apis With Built In Scripting And Collection Management
unknown confidenceAnd Dom Content When Triggered
unknown confidenceAnd Domain Analysis With 70 Av Engines
unknown confidenceAnd Driver Analysis Plugins For Kernel Rootkit Detection
unknown confidenceAnd Drivers
unknown confidenceAnd Dynamic Credential Generation
unknown confidenceAnd Dynamic Vlan Assignment
unknown confidenceAnd Elastic
unknown confidenceAnd Elements Tabs For Tracing Dom Based Xss Data Flows And Testing Payloads In Real Time
unknown confidenceAnd Embedded Data Within Firmware Images
unknown confidenceAnd Encryption Info
unknown confidenceAnd Encryption Settings
unknown confidenceAnd Endpoint Verification
unknown confidenceAnd Entitlement Management
unknown confidenceAnd Ethernet
unknown confidenceAnd Evaluating Exercises
unknown confidenceAnd Evil Twin Deployment
unknown confidenceAnd Exception Responses
unknown confidenceAnd Export Capabilities
unknown confidenceAnd Exporting Specific Fields For Analysis
unknown confidenceAnd Extracting Audit Data
unknown confidenceAnd Extracting San Lists From Certificates Retrieved Through Ct Monitoring
unknown confidenceAnd File Activity Logging
unknown confidenceAnd File Change Telemetry Ingested Into Splunk
unknown confidenceAnd File Read
unknown confidenceAnd File Telemetry
unknown confidenceAnd Fileless Malware Artifacts
unknown confidenceAnd Flood Tools
unknown confidenceAnd Formatting Iocs
unknown confidenceAnd Frida Discover
unknown confidenceAnd Function Url Authorization Types
unknown confidenceAnd GCP
unknown confidenceAnd Generating Adoption Reports
unknown confidenceAnd Generating Compliance Evidence
unknown confidenceAnd Generation Of Resources Based On Security Policies
unknown confidenceAnd Geographic Attributes
unknown confidenceAnd Geographic Locations
unknown confidenceAnd Go Lambda Runtimes
unknown confidenceAnd Google Dork Queries
unknown confidenceAnd Hidden Processes
unknown confidenceAnd Hipaa Compliance
unknown confidenceAnd Hipaa Controls
unknown confidenceAnd Historian Used For Testing Detection Rules Against Realistic Scada Traffic
unknown confidenceAnd Historical Scanning
unknown confidenceAnd Hollowing
unknown confidenceAnd Iac
unknown confidenceAnd Iam Bindings
unknown confidenceAnd Identity Based Access Control
unknown confidenceAnd Identity Based Access
unknown confidenceAnd Identity Checks
unknown confidenceAnd Iiot
unknown confidenceAnd Il Views Of Assembly Code
unknown confidenceAnd Immutable Backup Support
unknown confidenceAnd Incident Investigation
unknown confidenceAnd Incident Review
unknown confidenceAnd Industrial Protocol Support
unknown confidenceAnd Injected Modules
unknown confidenceAnd Insecure Configurations
unknown confidenceAnd Instant Mass Restore
unknown confidenceAnd Integration With Analysis Pipelines
unknown confidenceAnd Integration With Devops Pipelines
unknown confidenceAnd Intrusion Detection System For Passive Monitoring
unknown confidenceAnd Intrusion Detection
unknown confidenceAnd Investigation Workbench
unknown confidenceAnd Ioc Extraction
unknown confidenceAnd It Shop For Access Requests
unknown confidenceAnd Ja3
unknown confidenceAnd Jtag Protocols For Interfacing With Embedded Device Debug Interfaces
unknown confidenceAnd Jwks Spoofing
unknown confidenceAnd Kerberos Tickets From Windows Memory
unknown confidenceAnd Kernel Structure Inspection For Rootkit Detection
unknown confidenceAnd Kid Injection
unknown confidenceAnd Kubernetes Resources With Sbom Generation
unknown confidenceAnd Kubernetes Resources
unknown confidenceAnd Lambda Authorizers
unknown confidenceAnd Lifecycle Policies
unknown confidenceAnd Lighthouse Multi Tenant
unknown confidenceAnd Linker Detection Tool That Identifies Protection On Pe
unknown confidenceAnd Linkers Used To Build Pe Files
unknown confidenceAnd Local Outlier Factor For Anomaly Detection
unknown confidenceAnd Long Connections In Zeek Logs
unknown confidenceAnd Mach O Files
unknown confidenceAnd Macos Memory Analysis With Plugin Architecture
unknown confidenceAnd Macos
unknown confidenceAnd Manage Device Compliance States
unknown confidenceAnd Managing Vpc Firewall Rules In GCP
unknown confidenceAnd Managing Zeek Instances Across Single Or Clustered Deployments
unknown confidenceAnd Manipulating Application Behavior At Runtime
unknown confidenceAnd Manual Testing Tools Including Repeater
unknown confidenceAnd Many Other Protectors
unknown confidenceAnd Mask Attacks
unknown confidenceAnd Mdm Platforms
unknown confidenceAnd Memory Dumps
unknown confidenceAnd Metadata For Internet Connected Devices
unknown confidenceAnd Misconfigured Services
unknown confidenceAnd Missing Encryption
unknown confidenceAnd MITRE Att Ck Mapping
unknown confidenceAnd Ml Based Anomaly Detection
unknown confidenceAnd Mobile Evidence Analysis
unknown confidenceAnd Modified Kernel Modules
unknown confidenceAnd Modules
unknown confidenceAnd Monitoring Rule Performance
unknown confidenceAnd Monitoring Sign In Analytics
unknown confidenceAnd More
unknown confidenceAnd Mssql Enumeration And Exploitation
unknown confidenceAnd Mssql With Built In Modules For Password Spraying And Enumeration
unknown confidenceAnd Multiple Output Formats
unknown confidenceAnd Nano Form Factors
unknown confidenceAnd Network Activity
unknown confidenceAnd Network Connections
unknown confidenceAnd Network Flows
unknown confidenceAnd Network Monitoring
unknown confidenceAnd Network Protection
unknown confidenceAnd Network Requests For Phishing Detection
unknown confidenceAnd Network Requests For Phishing Url Triage
unknown confidenceAnd Network Requests
unknown confidenceAnd Network Topology
unknown confidenceAnd Networking
unknown confidenceAnd Nist
unknown confidenceAnd Oauth Grant Management
unknown confidenceAnd Object Retrieval
unknown confidenceAnd One Click Host Containment
unknown confidenceAnd Open Ports From Public Sources
unknown confidenceAnd Organizational Units
unknown confidenceAnd Other Architectures
unknown confidenceAnd Other Embedded Architecture Support For Firmware Binary Analysis
unknown confidenceAnd Other Linux Architectures
unknown confidenceAnd Other Protocols
unknown confidenceAnd Other Services For Isolated Malware Analysis Networks
unknown confidenceAnd Other Similarity Metrics
unknown confidenceAnd Other Threat Indicators
unknown confidenceAnd Other Tools For Low Level Smb Protocol Interaction
unknown confidenceAnd Otp Available In Usb A
unknown confidenceAnd Output Rails To Llm Applications Using Colang Flow Definitions And YAML Configuration
unknown confidenceAnd Packet Rate
unknown confidenceAnd Patching Integration
unknown confidenceAnd Payload Delivery Used Throughout Web Application Testing
unknown confidenceAnd Payload Delivery
unknown confidenceAnd Persistence Testing
unknown confidenceAnd Pickle Deserialization
unknown confidenceAnd Plugin Based Traffic Manipulation
unknown confidenceAnd Pmkid Formats
unknown confidenceAnd Policies From Windows
unknown confidenceAnd Policy Enforcement
unknown confidenceAnd Policy Generation
unknown confidenceAnd Post Exploitation Capabilities
unknown confidenceAnd Post Exploitation Modules For Comprehensive Smb Testing
unknown confidenceAnd Post Exploitation Tools For Validated Vulnerability Exploitation
unknown confidenceAnd Prioritization
unknown confidenceAnd Private Network Routing
unknown confidenceAnd Privileged Access Workflows
unknown confidenceAnd Process Activity For Observing Fileless Attack Behavior
unknown confidenceAnd Process Operations
unknown confidenceAnd Project Urls
unknown confidenceAnd Protection Scope Evaluation For Integrating Purview Dlp With Custom Applications And Siem Platforms
unknown confidenceAnd Protocol Decoding
unknown confidenceAnd Query Limits
unknown confidenceAnd Ransomware Extension Detection
unknown confidenceAnd Rate Limit Evasion Techniques
unknown confidenceAnd Raw Formats With Built In Hash Verification
unknown confidenceAnd Re Signing JWT Tokens With Various Attack Modes
unknown confidenceAnd Re Signing Jwts With Algorithm Manipulation Capabilities
unknown confidenceAnd Reading Enclave Console Output
unknown confidenceAnd Recording For Ot Remote Access
unknown confidenceAnd Redacting Sensitive Data
unknown confidenceAnd Register Data In Captured Packets
unknown confidenceAnd Registry Entries
unknown confidenceAnd Regulatory Compliance Capabilities
unknown confidenceAnd Reloading Configuration
unknown confidenceAnd Remote Execution Psexec
unknown confidenceAnd Repacking Firmware Images For Security Testing
unknown confidenceAnd Replaying API Requests With Extensions Like Autorize For Automated Authorization Testing
unknown confidenceAnd Replaying Requests With Sql Injection Payloads Across All Parameter Types
unknown confidenceAnd Report
unknown confidenceAnd Reporting
unknown confidenceAnd Resource Directories
unknown confidenceAnd Resource Inspection In A Single Interface
unknown confidenceAnd Resource Policies
unknown confidenceAnd Response Bodies
unknown confidenceAnd Response Platform
unknown confidenceAnd Restructuring Pdfs For Easier Analysis
unknown confidenceAnd Reviewing Activity Explorer Data And Dlp Alerts
unknown confidenceAnd Risk Based Access Controls For Azure Ad Applications
unknown confidenceAnd Risk Based Alerting
unknown confidenceAnd Risk
unknown confidenceAnd Risky User Behavior
unknown confidenceAnd Role Bindings
unknown confidenceAnd Rpki Status Changes
unknown confidenceAnd Rule Deployment
unknown confidenceAnd Runtime Process Monitoring
unknown confidenceAnd Runtime Telemetry
unknown confidenceAnd Runtime Versions
unknown confidenceAnd Scripted Analysis Pipelines
unknown confidenceAnd Scripting Capabilities
unknown confidenceAnd Scripting Support For Multiple Architectures
unknown confidenceAnd Secret Caching For Applications
unknown confidenceAnd Secure Boot Configuration Auditing
unknown confidenceAnd Security Anomalies
unknown confidenceAnd Security Feature Support
unknown confidenceAnd Security Signals
unknown confidenceAnd Sending Broadcasts
unknown confidenceAnd Sensitive Information Types
unknown confidenceAnd Sequencer
unknown confidenceAnd Service Creation Across The Enterprise
unknown confidenceAnd Sharing
unknown confidenceAnd Shimmer Analysis Of Speech Samples
unknown confidenceAnd Simulating Master Slave Communication In Test Environments
unknown confidenceAnd Sniffing Modbus Frames Enables Field Level Access To Mbap Headers
unknown confidenceAnd Social Media Analysis
unknown confidenceAnd Social Media Reconnaissance
unknown confidenceAnd Social Media
unknown confidenceAnd Spectrogram Generation
unknown confidenceAnd Sspm
unknown confidenceAnd Stakeholder Distribution Controls
unknown confidenceAnd Stakeholder Reporting Dashboards
unknown confidenceAnd Stepping Through Linux Binary Execution
unknown confidenceAnd Structural Patterns
unknown confidenceAnd Suspicious Command Patterns
unknown confidenceAnd Suspicious Indicators
unknown confidenceAnd System Binary Modifications
unknown confidenceAnd Tampering With JWT Tokens To Test Authentication Bypasses
unknown confidenceAnd Team Collaboration
unknown confidenceAnd Technical Intelligence For Adversary Profiling
unknown confidenceAnd Third Party Edr
unknown confidenceAnd Third Party Tools Into A Unified Dashboard
unknown confidenceAnd Threat Explorer For Investigation
unknown confidenceAnd Threat Hunting Capabilities
unknown confidenceAnd Threat Hunting
unknown confidenceAnd Threat Intelligence
unknown confidenceAnd Threat Protection Across Azure
unknown confidenceAnd TLS Connections
unknown confidenceAnd Token Exchanges
unknown confidenceAnd Transcription Logging
unknown confidenceAnd Transforming Data Useful For Deobfuscating Encoded Iocs
unknown confidenceAnd Trend Analysis
unknown confidenceAnd Triage Workflow Management
unknown confidenceAnd Trustsec Integration
unknown confidenceAnd Ttls
unknown confidenceAnd Ttps
unknown confidenceAnd Uefi Analysis
unknown confidenceAnd Uefi Configuration
unknown confidenceAnd Url Indicators For Matching Against Security Logs
unknown confidenceAnd Validating Cyclonedx Sboms Programmatically
unknown confidenceAnd Validating Firewall Effectiveness
unknown confidenceAnd Validating Stix 2 0
unknown confidenceAnd Values For Real Time Alerting
unknown confidenceAnd Verify Authentication Response Functions
unknown confidenceAnd Verifying Entries In The Rekor Transparency Log
unknown confidenceAnd Viewing Registered Accounts
unknown confidenceAnd Virtual Host Enumeration
unknown confidenceAnd Vpn Capabilities With Modbus
unknown confidenceAnd Vulnerability Assessment
unknown confidenceAnd Vulnerability Data For Ip Addresses
unknown confidenceAnd Vulnerability Detection Via The Nmap Scripting Engine
unknown confidenceAnd Vulnerability Management Designed For Critical Infrastructure
unknown confidenceAnd Vulnerability Searches
unknown confidenceAnd Winrm Traffic Analysis
unknown confidenceAnd Wmi Monitoring
unknown confidenceAnd Workload Protection
unknown confidenceAnd Yara Rules From Text
unknown confidenceAnd Zone Transfer Queries
unknown confidenceAndroguard
unknown confidenceAndroid Backup Extractor
unknown confidenceAndroid Lint
unknown confidenceAndroid Studio Profiler
unknown confidenceAnomali Threatstream
unknown confidenceAnomaly Detection
unknown confidenceAnsible Lockdown
unknown confidenceAnti Ransomware Detection
unknown confidenceAny Run API
unknown confidenceAny Run
unknown confidenceAPI Fuzzer
unknown confidenceAPI Gateway
unknown confidenceAPI Monitor
unknown confidenceApigee
unknown confidenceApktool
unknown confidenceAppcompatcacheparser
unknown confidenceApplocker
unknown confidenceArcher
unknown confidenceArjun
unknown confidenceArkime
unknown confidenceArm
unknown confidenceArp Scan
unknown confidenceArp
unknown confidenceArpspoof
unknown confidenceArpwatch
unknown confidenceArtifact Hash
unknown confidenceAsr Rules
unknown confidenceAssessing Third Party Risk
unknown confidenceAsset Identity Framework
unknown confidenceAst Analysis
unknown confidenceAthena
unknown confidenceAtomic Red Team Atomics
unknown confidenceAtomic Red Team
unknown confidenceAtt Ck Navigator
unknown confidenceAtt Ck Workbench
unknown confidenceAttackiq
unknown confidenceAttestation
unknown confidenceAttivo Networks
unknown confidenceAudit Log
unknown confidenceAuditd
unknown confidenceAusearch
unknown confidenceAuthor
unknown confidenceAuthorization Codes
unknown confidenceAuthorize
unknown confidenceAuto Classification
unknown confidenceAuto Labeling Rules
unknown confidenceAutobahn Testsuite
unknown confidenceAutomation
unknown confidenceAutomox
unknown confidenceAutopsy
unknown confidenceAutorepeater
unknown confidenceAutorize
unknown confidenceAutoruns
unknown confidenceAveva Historian
unknown confidenceAvml
unknown confidenceAwesome Waf
unknown confidenceAWS Access Analyzer
unknown confidenceAWS API Gateway
unknown confidenceAWS Athena
unknown confidenceAWS Audit Manager
unknown confidenceAWS Backup
unknown confidenceAWS Cli
unknown confidenceAWS Cloudtrail
unknown confidenceAWS Config
unknown confidenceAWS Cost Anomaly Detection
unknown confidenceAWS Detective
unknown confidenceAWS Ecr
unknown confidenceAWS Firewall Manager
unknown confidenceAWS Guardduty
unknown confidenceAWS Iam Access Analyzer
unknown confidenceAWS Iam Identity Center
unknown confidenceAWS Keys
unknown confidenceAWS Kms
unknown confidenceAWS Lambda Power Tuning
unknown confidenceAWS Lambda
unknown confidenceAWS Managed Rules
unknown confidenceAWS Nitro Enclaves Sdk C
unknown confidenceAWS S3 Object Lock
unknown confidenceAWS Secrets Manager
unknown confidenceAWS Security Hub Cspm
unknown confidenceAWS Security Hub
unknown confidenceAWS Systems Manager
unknown confidenceAWS Verified Access
unknown confidenceAWS Waf
unknown confidenceAWS X Ray
unknown confidenceAWS
unknown confidenceAzure Activity Logs
unknown confidenceAzure Ad Conditional Access
unknown confidenceAzure Ad External Identities
unknown confidenceAzure API Management
unknown confidenceAzure Arc
unknown confidenceAzure Backup
unknown confidenceAzure Cli
unknown confidenceAzure Conditional Access
unknown confidenceAzure Data Explorer
unknown confidenceAzure Immutable Blob
unknown confidenceAzure Information Protection
unknown confidenceAzure Logic Apps
unknown confidenceAzure Monitor
unknown confidenceAzure Policy
unknown confidenceAzure Resource Graph
unknown confidenceAzure Waf
unknown confidenceAzure
unknown confidenceAzureadrecon
unknown confidenceBaddns
unknown confidenceBandit
unknown confidenceBanners
unknown confidenceBarnyard2
unknown confidenceBas
unknown confidenceBase
unknown confidenceBatch Processing
unknown confidenceBatchql
unknown confidenceBeacon Detection
unknown confidenceBettercap 2 X
high confidenceBettercap
An extensible, cross‑platform network attack and reconnaissance framework for 802.11 Wi‑Fi, Ethernet/IPv4/IPv6, BLE, HID, and CAN‑bus, featuring MITM components, sniffing, spoofing, and scriptable automation via caplets.
unknown confidenceBeyondcorp Enterprise Connectors
unknown confidenceBeyondcorp
unknown confidenceBeyondtrust Privileged Remote Access
unknown confidenceBfg Repo Cleaner
unknown confidenceBgpalerter
unknown confidenceBinary Ninja
unknown confidenceBindings
unknown confidenceBinwalk
unknown confidenceBitlocker Recovery Password Viewer
unknown confidenceBitlocker
unknown confidenceBleak
unknown confidenceBlkls
unknown confidenceBlock Counts
unknown confidenceBlockchain Com API
unknown confidenceBlockchain
unknown confidenceBlockdev
unknown confidenceBlocked
unknown confidenceBlockstream Info
unknown confidenceBloodhound Ce
high confidenceBloodHound (Community Edition)
BloodHound is an open‑source tool from SpecterOps that applies graph theory to identity and access relationships to uncover attack paths (privilege escalation and lateral movement) across Microsoft Active Directory, Azure AD, and other platforms via an extension model.
unknown confidenceBootkits Analyzer
unknown confidenceBorgbackup
unknown confidenceBoss Of The Soc
unknown confidenceBoto3 Cloudtrail Client
unknown confidenceBreach Data
unknown confidenceBridgecrew
unknown confidenceBroadcast
unknown confidenceBroken Link Checker
unknown confidenceBrowser Developer Tools
unknown confidenceBrowser Devtools
unknown confidenceBrowsinghistoryview
unknown confidenceBrute Force
unknown confidenceBtlejuice
unknown confidenceBulk Extractor
unknown confidenceBurp Collaborator
unknown confidenceBurp Java Deserialization Scanner
unknown confidenceBurp JWT Editor
unknown confidenceBurp Sequencer
unknown confidenceBurp Suite Community
unknown confidenceBurp Suite JWT Editor
unknown confidenceBurp Suite Professional
unknown confidenceBurp Suite Repeater
unknown confidenceBurp Suite Turbo Intruder
high confidenceBurp Suite
An intercepting proxy–based toolkit and dynamic scanner for discovering and analyzing web application and API security issues across desktop and enterprise (DAST) editions.
unknown confidenceBurp Turbo Intruder
unknown confidenceBus Pirate
unknown confidenceBypassing Security Controls
unknown confidenceCabby
unknown confidenceCache Snooping
unknown confidenceCado Response
unknown confidenceCaldera
unknown confidenceCalico
unknown confidenceCallback
unknown confidenceCan I Take Over Xyz
unknown confidenceCanarytoken
unknown confidenceCanarytokens Org And Thinkst Canary Platforms
unknown confidenceCanarytokens Org
unknown confidenceCanarytokens
unknown confidenceCapa
unknown confidenceCape Sandbox
unknown confidenceCape
unknown confidenceCapinfos
unknown confidenceCaptive Portal
unknown confidenceCarbon Black App Control
unknown confidenceCartography
unknown confidenceCasb
unknown confidenceCdn Specific Tools
unknown confidenceCdp
unknown confidenceCedar Policy Language
unknown confidenceCellebrite Physical Analyzer
unknown confidenceCellebrite Ufed
unknown confidenceCerby
unknown confidenceCertipy
unknown confidenceCertspotter
unknown confidenceCff Explorer
unknown confidenceChainalysis Reactor
unknown confidenceChainsaw
unknown confidenceCharles Proxy
unknown confidenceCheckov
unknown confidenceChipsec
unknown confidenceChkrootkit
unknown confidenceChrome Devtools
unknown confidenceChrome Enterprise Premium
unknown confidenceChrome Enterprise
unknown confidenceChromecacheview
unknown confidenceChronicle Soar
unknown confidenceCi
unknown confidenceCimsession
unknown confidenceCircl Pdns
unknown confidenceCis Cat Pro Assessor
unknown confidenceCis Docker Benchmark V1 8 0 To Minimize Attack Surface
unknown confidenceCisa Ics Cert
unknown confidenceCisa Kev Catalog
unknown confidenceCisa Stopransomware Guide
unknown confidenceCisa Tabletop Exercise Packages
unknown confidenceCisco Catalyst
unknown confidenceCisco Industrial Ethernet Switches
unknown confidenceCisco Isa 3000
unknown confidenceCisco Ise
unknown confidenceCisco Umbrella
unknown confidenceClaim Manipulation
unknown confidenceClairvoyance
unknown confidenceClamav
unknown confidenceClaroty Ctd
unknown confidenceClaroty Secure Remote Access
unknown confidenceClaroty Xdome
unknown confidenceClaroty
unknown confidenceClass Dump
unknown confidenceClassifying
unknown confidenceClaude
unknown confidenceClickjack Tester
unknown confidenceCloud Asset Inventory
unknown confidenceCloud Audit Logs
unknown confidenceCloud Logging
unknown confidenceCloud
unknown confidenceCloudflare Access
unknown confidenceCloudflare Device Posture
unknown confidenceCloudflare Diagnostics
unknown confidenceCloudflare Gateway
unknown confidenceCloudflare Logpush
unknown confidenceCloudflare Tunnel
unknown confidenceCloudflare
unknown confidenceCloudformation Stacksets
unknown confidenceCloudformation
unknown confidenceCloudfox
unknown confidenceCloudfront
unknown confidenceCloudtrail Lake
unknown confidenceCloudtrail
unknown confidenceCloudwatch Logs Insights
unknown confidenceCloudwatch Metrics
unknown confidenceCloudwatch
unknown confidenceCni Plu
unknown confidenceCobalt Strike
unknown confidenceCobaltstrikeparser
unknown confidenceCode42 Incydr
unknown confidenceCodeql To Perform Automated Static Analysis And Vulnerability Detection Across Repositories At Enterprise Scale
unknown confidenceCodeql
unknown confidenceCohesity Dataprotect
unknown confidenceColang 2 0
unknown confidenceCollection Enumeration
unknown confidenceCommix
unknown confidenceCommunity Maintained Database Of 130 Documented Adversary Groups With Referenced Campaign Reports
unknown confidenceCommvault
unknown confidenceCompiler
unknown confidenceCompilers
unknown confidenceComponent
unknown confidenceCompression Formats
unknown confidenceCompromised Credentials
unknown confidenceCompute
unknown confidenceConditional Access Policies
unknown confidenceConducting
unknown confidenceConfig Aggregator
unknown confidenceConfig Conformance Packs
unknown confidenceConfig
unknown confidenceConfluence
unknown confidenceConftest
unknown confidenceConnection
unknown confidenceConsent Permissions
unknown confidenceConstrainttemplates
unknown confidenceConsul Template
unknown confidenceContainer Diff
unknown confidenceContainerlab
unknown confidenceContainers
unknown confidenceContainment
unknown confidenceContent Filtering
unknown confidenceContent Type Converter
unknown confidenceCookies
unknown confidenceCorrelation Searches
unknown confidenceCorrelation
unknown confidenceCors Scanner
unknown confidenceCorscanner
unknown confidenceCortex Data Lake
unknown confidenceCortex Xsoar
unknown confidenceCosign
unknown confidenceCovenant C2
unknown confidenceCowpatty
unknown confidenceCowrie
unknown confidenceCrackle
medium confidenceCrackMapExec (CME)
Open-source post-exploitation and lateral movement framework for automating credential validation, enumeration, and command execution across Windows/Active Directory networks over protocols like SMB, WinRM/WMI, MSSQL, and LDAP.
unknown confidenceCreatefunction And Data Events
unknown confidenceCreation Timestamps
unknown confidenceCredential Dumping
unknown confidenceCredential Harvesting
unknown confidenceCredential Testing
unknown confidenceCredential Vaulting
unknown confidenceCross Platform Backup Tool With Built In Encryption And Deduplication
unknown confidenceCrowdstrike Falcon API
unknown confidenceCrowdstrike Falcon Console
unknown confidenceCrowdstrike Falcon Device Control
unknown confidenceCrowdstrike Falcon Identity Protection
unknown confidenceCrowdstrike Falcon Intelligence
unknown confidenceCrowdstrike Falcon Zta
unknown confidenceCrowdstrike Falcon
unknown confidenceCrowdstrike Zta Integration
unknown confidenceCrowdstrike
unknown confidenceCrt Sh
unknown confidenceCryptotester
unknown confidenceCsp Bypass
unknown confidenceCsp Evaluator
unknown confidenceCsp Scanner
unknown confidenceCsrftester
unknown confidenceCt Woodpecker
unknown confidenceCtid Att Ck Workbench
unknown confidenceCuckoo Sandbox
unknown confidenceCuckoodroid
unknown confidenceCurl
unknown confidenceCustom Python Scripts
unknown confidenceCustom Scripts
unknown confidenceCvss Scoring
unknown confidenceCwp
unknown confidenceCyberark Or Beyondtrust For Secure Administrative Operations
unknown confidenceCyberark Privileged Access Security
unknown confidenceCyberark
unknown confidenceCyberchef
unknown confidenceCyclonedx Python Lib
unknown confidenceCycript
unknown confidenceCylr
unknown confidenceDalfox
unknown confidenceDamerau Levenshtein
unknown confidenceDark Web
unknown confidenceData Classification Insights
unknown confidenceDatabase Extraction
unknown confidenceDatadog
unknown confidenceDb Browser For Sqlite
unknown confidenceDbeaver
unknown confidenceDc3dd
unknown confidenceDce Rpc
unknown confidenceDcfldd
unknown confidenceDcsync
unknown confidenceDd
unknown confidenceDe Identifying
unknown confidenceDe4dot
unknown confidenceDe4js
unknown confidenceDebug Endpoints
unknown confidenceDecoding Resources To Near Original Form
unknown confidenceDecompiler
unknown confidenceDecrypting
unknown confidenceDeepset
unknown confidenceDefanging
unknown confidenceDefectdojo
unknown confidenceDelinea Distributed Engine
unknown confidenceDelinea Secret Server
unknown confidenceDemo Yubico Com
unknown confidenceDependabot
unknown confidenceDeploy Configuration Profiles
unknown confidenceDeployed In Dmz For Enterprise Access
unknown confidenceDetect It Easy
unknown confidenceDeveloper Portal
unknown confidenceDevice
unknown confidenceDhcp
unknown confidenceDialog
unknown confidenceDig
unknown confidenceDigital Guardian
unknown confidenceDionaea
unknown confidenceDirbuster
unknown confidenceDistroless Images
unknown confidenceDistroless
unknown confidenceDive
unknown confidenceDkimpy
unknown confidenceDll Export Viewer
unknown confidenceDll
unknown confidenceDlp Policies New Dlpcompliancepolicy
unknown confidenceDlp Policies
unknown confidenceDlp Violations
unknown confidenceDlp
unknown confidenceDnp3
unknown confidenceDNS Brute Forcing
unknown confidenceDNS Filtering
unknown confidenceDNS Logs
unknown confidenceDNS Queries
unknown confidenceDNS Query Analysis
unknown confidenceDNS Response Policy Zone
unknown confidenceDNS Spoofing
unknown confidenceDNS Tunneling
unknown confidenceDNS With Cross Platform Implants
unknown confidenceDNS
unknown confidenceDnspy
unknown confidenceDnspython
high confidenceDNSRecon
DNSRecon is a Python-based DNS enumeration tool for security assessments that automates record discovery, zone transfer testing, DNSSEC zone walking, cache snooping, reverse lookups, and wordlist-based subdomain brute forcing, with export to XML/CSV/JSON and optional REST API and Shodan-assisted enrichment.
unknown confidenceDnssec Validation
unknown confidenceDnstwist
unknown confidenceDnsx
unknown confidenceDocker Bench Security
unknown confidenceDocker Buildkit
unknown confidenceDocker Diff
unknown confidenceDocker Explorer
unknown confidenceDocker Inspect
unknown confidenceDom Invader
unknown confidenceDom
unknown confidenceDomain
unknown confidenceDomains
unknown confidenceDompurify
unknown confidenceDotdotpwn
unknown confidenceDotfuscator
unknown confidenceDotpeek
unknown confidenceDrag And Drop Playbook Builder With 2 800 Automated Actions
unknown confidenceDragos Platform
unknown confidenceDredd
unknown confidenceDrivers
unknown confidenceDrozer
unknown confidenceDsdump
unknown confidenceDsinternals Powershell Module
unknown confidenceDsinternals
unknown confidenceDtd Finder
unknown confidenceDtex Intercept
unknown confidenceDumpit
unknown confidenceDuo Security
unknown confidenceDuo
unknown confidenceEclecticiq
unknown confidenceEd25519
unknown confidenceEdiscovery
unknown confidenceEditcap
unknown confidenceEditing
unknown confidenceEdr And Process Telemetry
unknown confidenceEdr
unknown confidenceElastic Agent
unknown confidenceElastic Detection Rules
unknown confidenceElastic Endpoint Security
unknown confidenceElastic Endpoint
unknown confidenceElastic Kibana Dashboard
unknown confidenceElastic Security Eql
unknown confidenceElastic Security
unknown confidenceElastic Siem Ml Jobs
unknown confidenceElastic Siem
unknown confidenceElastic Stack
unknown confidenceElastic
unknown confidenceElasticsearch
unknown confidenceElf
unknown confidenceElk Stack
unknown confidenceEmail Gateway
unknown confidenceEmail Security
unknown confidenceEmail Templates
unknown confidenceEmet
unknown confidenceEmployee Names
unknown confidenceEmux
unknown confidenceEnabling Auditing Of Enclave Originated Cryptographic Operations
unknown confidenceEnabling Comparison Of Planned Vs Executed Vs Detected Techniques
unknown confidenceEnabling Download Count Comparison Between Suspected Typosquats And Their Targets
unknown confidenceEnabling
unknown confidenceEncoders
unknown confidenceEncrypting Responses To The Enclave S Ephemeral Public Key
unknown confidenceEncryption As A Service
unknown confidenceEncryption
unknown confidenceEndpoint Protector
unknown confidenceEndpoint Verification
unknown confidenceEngineering Workstations
unknown confidenceEntropy Analysis
unknown confidenceEntropy Calculation
high confidenceenum4linux-ng
A next-generation rewrite of enum4linux that enumerates information from Windows and Samba systems via SMB/RPC/LDAP, adds structured JSON/YAML output, and wraps core Samba client tools for use by security professionals and CTF players.
unknown confidenceEnvoy Proxy
unknown confidenceEnvoy Rate Limit Service
unknown confidenceEql Sequences
unknown confidenceEric Zimmerman S Tools
unknown confidenceEric Zimmerman Tools
unknown confidenceError Messages
unknown confidenceErythrite
unknown confidenceEscalation
unknown confidenceEslint Security Plugin
unknown confidenceEspresso
unknown confidenceEssential For Blind Stored Xss
unknown confidenceEt Pro
unknown confidenceEtc
unknown confidenceEthernet
unknown confidenceEttercap
unknown confidenceEvebox
unknown confidenceEvent Classification
unknown confidenceEvent Log Explorer
unknown confidenceEventbridge And Lambda To Enable Real Time Incident Response
unknown confidenceEvilginx2
unknown confidenceEvilginx3
unknown confidenceEvtxecmd
unknown confidenceEvtxexport
unknown confidenceExabeam Advanced Analytics
unknown confidenceExabeam
unknown confidenceExamining Memory
unknown confidenceExcel
unknown confidenceExec
unknown confidenceExecution Role Permissions
unknown confidenceExiftool
unknown confidenceExploit
unknown confidenceExploits
unknown confidenceExpress Rate Limit
unknown confidenceExtracting Dxe Drivers
unknown confidenceExtracting Vba Macros
unknown confidenceExtracting
unknown confidenceExtrahop
unknown confidenceFail2ban 0 11
unknown confidenceFail2ban Client
unknown confidenceFail2ban Regex
unknown confidenceFake Router6
unknown confidenceFakenet Ng
unknown confidenceFalco And Opa Policies
unknown confidenceFalco Rules
unknown confidenceFalco
unknown confidenceFalcon Data Replicator
unknown confidenceFalcon Siem Connector
unknown confidenceFarsight Dnsdb
unknown confidenceFeeding Results Into Splunk
unknown confidenceFeitian
unknown confidenceFema Homeland Security Exercise And Evaluation Program
unknown confidenceFema Hseep
unknown confidenceFeodo Tracker
unknown confidenceFeroxbuster
unknown confidenceFfmpeg
high confidenceffuf
ffuf is a fast, flexible web fuzzer for web content discovery and request templating. It automates path, parameter, and virtual host discovery using wordlists and response-based match/filter logic, supporting machine-readable outputs for integration into broader security workflows.
unknown confidenceFido2 Security Keys
unknown confidenceFido2
unknown confidenceField Suggestions
unknown confidenceFile Extraction
unknown confidenceFile Systems
unknown confidenceFile
unknown confidenceFilebeat
unknown confidenceFilesystem
unknown confidenceFilesystems
unknown confidenceFiltering By Function Code
unknown confidenceFiltering
unknown confidenceFindcrypt
unknown confidenceFirewall Zones
unknown confidenceFirmadyne
unknown confidenceFirmae
unknown confidenceFirmware Mod Kit
unknown confidenceFlare
unknown confidenceFlashpoint
unknown confidenceFlashrom
unknown confidenceFlask Limiter
unknown confidenceFleetdm
unknown confidenceFloss
unknown confidenceFls
unknown confidenceFluentd
unknown confidenceForcepoint Dlp
unknown confidenceForcepoint Insider Threat
unknown confidenceForemost
unknown confidenceForseti Security
unknown confidenceFortinet Fortigate Rugged Series
unknown confidenceFortinet Fortigate Rugged
unknown confidenceFreddy
unknown confidenceFreeradius
unknown confidenceFrida Discover
unknown confidenceFrida Ios Dump
unknown confidenceFrida Repl
unknown confidenceFrida Tools
unknown confidenceFrida Trace
unknown confidenceFrida
unknown confidenceFrogger
unknown confidenceFrrouting
unknown confidenceFsrm
unknown confidenceFtk Imager
unknown confidenceFulcio
unknown confidenceFunction Codes
unknown confidenceFusion Ml Engine
unknown confidenceFuzz Lightyear
unknown confidenceFwaas
unknown confidenceGam
unknown confidenceGatekeeper
unknown confidenceGatling
unknown confidenceGattacker
unknown confidenceGcloud Cli
unknown confidenceGcloud Compute Firewall Rules
unknown confidenceGCP Audit Logs
unknown confidenceGCP Cloud Logging
unknown confidenceGCP Event Threat Detection
unknown confidenceGCP Identity Aware Proxy
unknown confidenceGCP Security Auditing Tool Generating Comprehensive Risk Reports From API Data Collection
unknown confidenceGCP Security Command Center
unknown confidenceGcpbucketbrute
unknown confidenceGdb
unknown confidenceGenerate Authentication Options
unknown confidenceGetnpusers
unknown confidenceGf
unknown confidenceGhidra
unknown confidenceGit Dumper
unknown confidenceGit Filter Repo
unknown confidenceGit Repos
unknown confidenceGit Secrets
unknown confidenceGithub Advanced Security
unknown confidenceGithub Secret Scanning
unknown confidenceGithub Security Overview
unknown confidenceGitlab Ci
unknown confidenceGitlab Wiki
unknown confidenceGitleaks
unknown confidenceGlobalprotect Agent
unknown confidenceGmer
unknown confidenceGobuster Vhost
high confidenceGobuster
High-performance, wordlist-driven enumerator for web content, DNS subdomains, virtual hosts, and select cloud/TFTP targets.
unknown confidenceGodpotato
unknown confidenceGoogle Admin Console
unknown confidenceGoogle Argon
unknown confidenceGoogle Beyondcorp Enterprise
unknown confidenceGoogle Cloud Dlp API
unknown confidenceGoogle Cloud Iap
unknown confidenceGoogle Titan Storing Cryptographic Credentials For Phishing Resistant Authentication
unknown confidenceGoogle Workspace Alert Center
unknown confidenceGopherus
unknown confidenceGophish
unknown confidenceGowitness
unknown confidenceGpg
unknown confidenceGpresult
unknown confidenceGradient Boosting
unknown confidenceGrafana
unknown confidenceGraph Analysis
unknown confidenceGraphql Cop
unknown confidenceGraphql Voyager
unknown confidenceGrassmarlin
unknown confidenceGreenbone
unknown confidenceGreynoise
unknown confidenceGrficsv2
unknown confidenceGridsure
unknown confidenceGroup Policy Management Console
unknown confidenceGroup Policy
unknown confidenceGroups
unknown confidenceGrr Rapid Response
unknown confidenceGrype
unknown confidenceGtfobins
unknown confidenceGuardduty Lambda Protection
unknown confidenceGuardicore Agents
unknown confidenceGuardicore Centra
unknown confidenceGuardicore Insight
unknown confidenceGuardicore Reveal
unknown confidenceGuardrails Ai
unknown confidenceGuest Management
unknown confidenceH2csmuggler
unknown confidenceHackvertor
unknown confidenceHadolint
unknown confidenceHandshake Capture
unknown confidenceHarbor
unknown confidenceHardcoded Secrets
unknown confidenceHardenize
unknown confidenceHardware Tokens
high confidenceHashcat
A high-performance, cross‑platform password recovery tool that supports hundreds of hash and key‑derivation formats, multiple attack modes, and GPU/accelerator backends for offline credential security testing.
unknown confidenceHashdeep
unknown confidenceHashes
unknown confidenceHashicorp Boundary
unknown confidenceHashicorp Vault
unknown confidenceHashlib
unknown confidenceHave I Been Pwned Enterprise
unknown confidenceHaveibeenpwned
unknown confidenceHavij
unknown confidenceHavoc
unknown confidenceHayabusa
unknown confidenceHcxdumptool
unknown confidenceHcxtools
unknown confidenceHdparm
unknown confidenceHex
unknown confidenceHidden Processes
unknown confidenceHierarchical Firewall Policies
unknown confidenceHindsight
unknown confidenceHipaa
unknown confidenceHistorians
unknown confidenceHmac Sha256
unknown confidenceHmi
unknown confidenceHollows Hunter
unknown confidenceHoneydb
unknown confidenceHoneywell Forge Cybersecurity
unknown confidenceHooking
unknown confidenceHost Lists
unknown confidenceHostapd Mana
unknown confidenceHosts
unknown confidenceHp Aruba Cx
unknown confidenceHping3
unknown confidenceHstspreload Org
unknown confidenceHvac
high confidenceOry Hydra
Ory Hydra is an open-source, OpenID Certified OAuth 2.0 and OpenID Connect (OIDC) authorization server that exposes headless APIs for issuing and managing tokens used to protect APIs and applications.
unknown confidenceI2c
unknown confidenceIac Scanning
unknown confidenceIam Access Analyzer
unknown confidenceIam Policy Simulator
unknown confidenceIam Recommender
unknown confidenceIap Tcp Forwarding
unknown confidenceIbm Qradar Siem
unknown confidenceIcarus
unknown confidenceIcat
unknown confidenceIcmp With Control Over Flags
unknown confidenceIcmp
unknown confidenceIcs Aware Ids And Protocol Deep Packet Inspection
unknown confidenceId Ransomware
unknown confidenceIda Pro And Ghidra With Techniques For Handling Non Null Terminated Strings
unknown confidenceIda Pro
unknown confidenceIdentity Filtering
unknown confidenceIdentityiq Compliance Manager
unknown confidenceIdentityiq Report Builder
unknown confidenceIdeviceinstaller
unknown confidenceIds Signatures
unknown confidenceIdt Hooks
unknown confidenceIdt
unknown confidenceIec 60870 5 104
unknown confidenceIec 62443 And Nist Sp 800 82 Guidelines
unknown confidenceIexplorer
unknown confidenceIleapp
unknown confidenceIlspy
unknown confidenceImages
unknown confidenceImmersive Labs
unknown confidenceImpacket Secretsdump Py
high confidenceImpacket
Open-source Python library and example tools that implement and manipulate network protocols (notably SMB, MSRPC, Kerberos, NTLM, LDAP, MSSQL) to enable low-level packet crafting, protocol clients, and security testing workflows across Windows-centric enterprise networks. ([github.com](https://github.com/fortra/impacket))
unknown confidenceImplementation Tiers To Measure Organizational Cybersecurity Posture And Create Improvement Roadmaps
unknown confidenceImports
unknown confidenceIndicators
unknown confidenceInetsim
unknown confidenceInfection Monkey
unknown confidenceInfoblox DNS Firewall
unknown confidenceInjected Processes
unknown confidenceInql
unknown confidenceInspecting
unknown confidenceIntegration
unknown confidenceIntel 471
unknown confidenceIntent Fuzzer
unknown confidenceInteract Sh
unknown confidenceInteractsh
unknown confidenceInterception
unknown confidenceIntruder
unknown confidenceIntune App Sdk
unknown confidenceIntune App Wrapping Tool
unknown confidenceInvoke Atomicredteam
unknown confidenceIoc Tables
unknown confidenceIocextract
unknown confidenceIot
unknown confidenceIp Addressing
unknown confidenceIp Ranges
unknown confidenceIp
unknown confidenceIperf3
unknown confidenceIps
unknown confidenceIptables
unknown confidenceIrp Hooks
unknown confidenceIs Is With Rpki Validation Capabilities
unknown confidenceJa3
unknown confidenceJadx
unknown confidenceJamf Pro
unknown confidenceJaro Winkler
unknown confidenceJava
unknown confidenceJefferson
unknown confidenceJira Service Management
unknown confidenceJira
unknown confidenceJitter
unknown confidenceJlecmd
unknown confidenceJoe Sandbox
high confidenceJohn the Ripper
John the Ripper is an open-source, offline password auditing tool from Openwall. The community “Jumbo” edition adds extensive hash/credential format support and optional GPU acceleration via OpenCL.
unknown confidenceJpeginfo
unknown confidenceJq
unknown confidenceJscrambler
unknown confidenceJsdetox
unknown confidenceJSON For Ci
unknown confidenceJSON Schema Compliance
unknown confidenceJsql Injection
unknown confidenceJunit
unknown confidenceJWT Editor
unknown confidenceJWT Io
unknown confidenceJWT Tool
unknown confidenceKadimus
unknown confidenceKamacite
unknown confidenceKape
unknown confidenceKerberos Used For Relay Attacks And Remote Execution
unknown confidenceKerberos
unknown confidenceKev Catalog
unknown confidenceKey Confusion
unknown confidenceKics
unknown confidenceKinesis Firehose
unknown confidenceKing Phisher
unknown confidenceKismet
unknown confidenceKiterunner
unknown confidenceKmstool Enclave Cli
unknown confidenceKolide
unknown confidenceKong Gateway
unknown confidenceKong Rate Limiting Plugin
unknown confidenceKube Bench
unknown confidenceKubeaudit
unknown confidenceKubectl
unknown confidenceKubernetes
unknown confidenceKubesec
unknown confidenceKubiscan
unknown confidenceKyverno
unknown confidenceLabel Policies
unknown confidenceLanding Pages
unknown confidenceLast
unknown confidenceLaunching
unknown confidenceLayers
unknown confidenceLazagne
unknown confidenceLdap Integration
unknown confidenceLdap
unknown confidenceLecmd
unknown confidenceLevenshtein Distance Use For Proactive Phishing Domain Detection And Certificate Monitoring
unknown confidenceLevenshtein Distance
unknown confidenceLfisuite
unknown confidenceLgpo Exe
unknown confidenceLib4sbom
unknown confidenceLibimobiledevice
unknown confidenceLibrosa
unknown confidenceLifecycle Management
unknown confidenceLightweight Pattern Matching Sast Tool With 3000 Community Rules And Custom Rule Support
unknown confidenceLime And Volatility
unknown confidenceLime
unknown confidenceLinked Libraries
high confidencelinPEAS
An open-source Linux/Unix privilege-escalation enumeration script in the PEASS-ng suite that audits a host for misconfigurations, vulnerabilities, and environmental conditions that could enable local privilege escalation.
unknown confidenceLinux Exploit Suggester
unknown confidenceListing
unknown confidenceLlm API Gpt 4
unknown confidenceLlm Based Detection
unknown confidenceLnk Explorer
unknown confidenceLnk Parser
unknown confidenceLnkparse3
unknown confidenceLocation
unknown confidenceLog Analytics Workspace
unknown confidenceLog2timeline
unknown confidenceLogparser
unknown confidenceLolbas Project
unknown confidenceLolbas
unknown confidenceLsblk
unknown confidenceLynis
unknown confidenceMacos
unknown confidenceMactime
unknown confidenceMagnet Axiom
unknown confidenceMagnet Ram Capture
unknown confidenceMailhog
unknown confidenceMalleable C2 Profiles
unknown confidenceMalpedia Yara
unknown confidenceMalpedia
unknown confidenceMaltego
unknown confidenceMalware Families
unknown confidenceMalware Mutex
unknown confidenceMalwarebazaar
unknown confidenceManage Bde Exe
unknown confidenceMandiant Advantage Threat Intelligence
unknown confidenceManually Banning
unknown confidenceMaps
unknown confidenceMarkets
unknown confidenceMarshalsec
unknown confidenceMbam
unknown confidenceMeat
unknown confidenceMemcached
unknown confidenceMemory
unknown confidenceMemprocfs
unknown confidenceMergecap
high confidenceMetasploit Framework
An extensible Ruby-based platform from Rapid7 for developing, testing, and executing exploits, payloads, and related modules against target systems, with data management and remote APIs for integration into security workflows.
unknown confidenceMfa
unknown confidenceMftecmd
unknown confidenceMftexplorer
unknown confidenceMicrosoft 365 Defender Portal
unknown confidenceMicrosoft Defender Device Control
unknown confidenceMicrosoft Defender Exploit Guard
unknown confidenceMicrosoft Defender For Cloud Apps
unknown confidenceMicrosoft Defender For Cloud
unknown confidenceMicrosoft Defender For Endpoint API
unknown confidenceMicrosoft Defender For Endpoint
unknown confidenceMicrosoft Defender For Identity
unknown confidenceMicrosoft Defender For Office 365
unknown confidenceMicrosoft Defender For Storage
unknown confidenceMicrosoft Defender Portal
unknown confidenceMicrosoft Dsrm
unknown confidenceMicrosoft Entra Admin Center
unknown confidenceMicrosoft Entra Id Conditional Access
unknown confidenceMicrosoft Entra Id Governance
unknown confidenceMicrosoft Entra Id Protection
unknown confidenceMicrosoft Graph And Audit Logs
unknown confidenceMicrosoft Graph API Audit Logs
unknown confidenceMicrosoft Graph API To Detect Email Forwarding Rule Creation
unknown confidenceMicrosoft Graph API
unknown confidenceMicrosoft Graph Powershell Sdk
unknown confidenceMicrosoft Graph Security API
unknown confidenceMicrosoft Intune
unknown confidenceMicrosoft Laps
unknown confidenceMicrosoft Nps
unknown confidenceMicrosoft Presidio
unknown confidenceMicrosoft Purview Compliance Portal
unknown confidenceMicrosoft Purview Dlp
unknown confidenceMicrosoft Purview
unknown confidenceMicrosoft Security Compliance Toolkit
unknown confidenceMicrosoft Sentinel Ueba
unknown confidenceMicrosoft Sentinel Workbooks
unknown confidenceMicrosoft Sentinel
unknown confidenceMicrosoft Threat Intelligence
unknown confidenceMicrosoft Word
unknown confidenceMimikatz Lsadump
high confidencemimikatz
Open‑source Windows security research tool by Benjamin Delpy (gentilkiwi) best known for extracting credentials from memory and manipulating authentication artifacts (e.g., LSASS contents, Kerberos tickets) and performing directory replication–based credential access (DCSync).
unknown confidenceMinio
unknown confidenceMips
unknown confidenceMisconfigurations
unknown confidenceMisp Correlation Engine
unknown confidenceMisp
unknown confidenceMitigations
unknown confidenceMitm6
unknown confidenceMitmproxy
unknown confidenceMITRE Att Ck Groups
unknown confidenceMITRE Att Ck Navigator
unknown confidenceMITRE Att Ck
unknown confidenceMITRE Att
unknown confidenceMITRE Caldera
unknown confidenceMitreattack Python
unknown confidenceMixers
unknown confidenceMmls
unknown confidenceMobsf
unknown confidenceModbus
unknown confidenceModifying
unknown confidenceModsecurity
unknown confidenceModule
unknown confidenceModules
unknown confidenceMoneta
unknown confidenceMongodb Shell
unknown confidenceMonitoring
unknown confidenceMozilla Observatory
unknown confidenceMschapv2
unknown confidenceMsrpc
unknown confidenceMulti Step Attack Chains Beyond Single Atomic Tests
unknown confidenceMutation
unknown confidenceMxtoolbox
unknown confidenceMythic
unknown confidenceMzcacheview
unknown confidenceNdiff
unknown confidenceNdpmon
unknown confidenceNemesis
unknown confidenceNeo4j
unknown confidenceNessus Expert
unknown confidenceNessus Professional
unknown confidenceNessus
unknown confidenceNetbox
unknown confidenceNetflow
unknown confidenceNetgate Autoconfigbackup
unknown confidenceNetskope Casb
unknown confidenceNetskope
unknown confidenceNetwork Capture
unknown confidenceNetwork Captures
unknown confidenceNetwork Flows
unknown confidenceNetworking
unknown confidenceNetworkminer
unknown confidenceNew Dlpcompliancerule
unknown confidenceNewman Reporter Htmlextra
unknown confidenceNewman
unknown confidenceNextdns
unknown confidenceNfc
unknown confidenceNgrep
unknown confidenceNightfall Ai
high confidenceNikto
Nikto is a Perl-based web server scanner that performs tests for dangerous files/CGIs, outdated server software, and common misconfigurations, producing machine- and human-readable reports.
unknown confidenceNist 800 53
unknown confidenceNist Csf
unknown confidenceNist
unknown confidenceNitro Cli
unknown confidenceNitro Enclaves Acm
unknown confidenceNmap 7 90
unknown confidenceNmap Parse Output
unknown confidenceNmap With Ot Scripts
high confidenceNmap
Nmap is a widely used, open-source scanner for network exploration and security auditing that discovers hosts, enumerates open ports and services, identifies software/OS fingerprints, and supports extensible scripting for higher-level checks.
unknown confidenceNo More Ransom Project
unknown confidenceNo More Ransom
unknown confidenceNode Js Vm Module
unknown confidenceNode Js
unknown confidenceNodejs
unknown confidenceNomoreransom Org
unknown confidenceNone Bypass
unknown confidenceNosql
unknown confidenceNosqli
unknown confidenceNosqlmap
unknown confidenceNotation
unknown confidenceNow Deprecated
unknown confidenceNozomi Guardian
unknown confidenceNozomi Networks Guardian
unknown confidenceNozomi
unknown confidenceNping
unknown confidenceNpm Audit
unknown confidenceNpm Download Counts API
unknown confidenceNpm Registry API
unknown confidenceNrf52840 Usb Dongle Nrf Sniffer
unknown confidenceNsrl
unknown confidenceNsurlsession
unknown confidenceNtfs Log Tracker
unknown confidenceNtlm Hashes
unknown confidenceNtlmrelayx
unknown confidenceNtlmssp Authentication
unknown confidenceNuclei
unknown confidenceNudge Security
unknown confidenceNvdlib
unknown confidenceNvidia Nemo Guardrails
unknown confidenceNxlog
unknown confidenceOauth Tools Com
unknown confidenceOauth2 Security Tester
unknown confidenceObfuscator
unknown confidenceObjection
unknown confidenceOfac Sdn List
unknown confidenceOffense Management
unknown confidenceOffense Operations
unknown confidenceOkta Advanced Server Access
unknown confidenceOkta Device Trust
unknown confidenceOkta Identity Engine
unknown confidenceOkta Identity Governance
unknown confidenceOkta Workflows
unknown confidenceOkta
unknown confidenceOledump Py
unknown confidenceOletools
unknown confidenceOllama
unknown confidenceOne Class Svm
unknown confidenceOne Identity Manager
unknown confidenceOpa
unknown confidenceOpc Ua
unknown confidenceOpc
unknown confidenceOpen Policy Agent
unknown confidenceOpen Ports
unknown confidenceOpenai Guardrails Python
unknown confidenceOpenapi Specifications And JSON Schema To Enforce Input
unknown confidenceOpencanary
unknown confidenceOpencti Graph
unknown confidenceOpencti Reports
unknown confidenceOpencti
unknown confidenceOpenpgp
unknown confidenceOpenplc
unknown confidenceOpenredirex
unknown confidenceOpenscap
unknown confidenceOpenssl
unknown confidenceOpenstego
unknown confidenceOpentaxii
unknown confidenceOpenvas
unknown confidenceOpenvpn
unknown confidenceOr External Remediation Systems
unknown confidenceOr In Memory Stores
unknown confidenceOr Organization
unknown confidenceOr Public Key
unknown confidenceOr Route Alerts Based On Enrichment Results
unknown confidenceOr Third Party Analytics
unknown confidenceOrganized By Technique Id
unknown confidenceOs Detection
unknown confidenceOs Version
unknown confidenceOsint Framework
unknown confidenceOsisoft Pi Server
unknown confidenceOspf
unknown confidenceOsquery Go
unknown confidenceOsquery
unknown confidenceOssec
unknown confidenceOtool
unknown confidenceOverprivileged Roles
unknown confidenceOwasp Dependency Check
unknown confidenceOwasp Dependency Track
unknown confidenceOwasp Llm Top 10
unknown confidenceOwasp Risk Rating Methodology To Separate True Positives From False Positives And Prioritize Remediation
unknown confidenceOwasp Serverless Top 10
unknown confidenceOwasp Threat Dragon
unknown confidenceOwasp Zap
unknown confidenceOxml Xxe
unknown confidenceOxt Me
unknown confidencePacket Parsing
unknown confidencePacketfence
unknown confidencePacu
unknown confidencePagerduty
unknown confidencePalantir Wef Configuration
unknown confidencePalo Alto Iot
unknown confidencePalo Alto Networks Ngfw
unknown confidencePalo Alto Ngfw
unknown confidencePalo Alto Xsoar
unknown confidencePalo Alto
unknown confidenceParam Miner
unknown confidenceParameter Fuzzing
unknown confidenceParasite6
unknown confidenceParsing
unknown confidencePassivedns
unknown confidencePassword Rotation
unknown confidencePayloads
unknown confidencePayloadsallthethings
unknown confidencePci Dss
unknown confidencePdf Parser Py
unknown confidencePdf Parser
unknown confidencePdfid Py
unknown confidencePdfid
unknown confidencePdfs
unknown confidencePe Bear
unknown confidencePe Sieve
unknown confidencePeap
unknown confidencePecmd
unknown confidencePeepdf 3
unknown confidencePeepdf
unknown confidencePefile
unknown confidencePersistence
unknown confidencePersistencesniper
unknown confidencePestudio
unknown confidencePfblockerng
unknown confidencePfsense 2 7
unknown confidencePfsense
unknown confidencePg Restore
unknown confidencePhishtool
unknown confidencePhotorec
unknown confidencePhp Interactive Shell
unknown confidencePhpggc
unknown confidencePhpstan
unknown confidencePi Vision
unknown confidencePingcastle
unknown confidencePip Audit
unknown confidencePir Tracking
unknown confidencePiv
unknown confidencePkce
unknown confidencePkcs 11 Interface For Cryptographic Key Management
unknown confidencePlaso
unknown confidencePlcinject
unknown confidencePlus Repeater And Intruder For Manual Payload Testing
unknown confidencePolicies
unknown confidencePolicy Analyzer
unknown confidencePopularity
unknown confidencePort Scanning
unknown confidencePort Security
unknown confidencePort
unknown confidencePostgresql For Siem Integration
unknown confidencePostman Collection Runner
unknown confidencePostman Flows
unknown confidencePostman
unknown confidencePosture Assessment
unknown confidencePosture
unknown confidencePower Bi
unknown confidencePowerpc Architectures Common In Plcs
unknown confidencePowershell Get Mppreference
unknown confidencePowershell Get Wmiobject
unknown confidencePowershell Logging
unknown confidencePowershell
unknown confidencePpfuzz
unknown confidencePraat
unknown confidencePre Commit
unknown confidencePrefetch Hash Calculator
unknown confidencePrelude Operator
unknown confidencePrincipal Mapper
unknown confidencePrintspoofer
unknown confidencePrioritization
unknown confidencePrisma Access
unknown confidencePrivilege Escalation Vectors
unknown confidencePrivilege Escalation
unknown confidencePrivileged Access Management
unknown confidenceProcess Hacker
unknown confidenceProcess Kill
unknown confidenceProcess Monitor
unknown confidenceProcess Trees
unknown confidenceProcesses
unknown confidenceProcessmitigations Powershell
unknown confidenceProofpoint Tap
unknown confidenceProofpoint
unknown confidenceProtectai
unknown confidencePrototype Pollution Gadgets Scanner
unknown confidenceProwler Azure
unknown confidenceProwler
unknown confidencePsfalcon
unknown confidencePsort
unknown confidencePsutil
unknown confidencePtes Methodology
unknown confidencePublic Access
unknown confidencePulledpork 3
unknown confidencePy Webauthn
unknown confidencePybgpstream
unknown confidencePycryptodome
unknown confidencePyelftools
unknown confidencePyjwt
unknown confidencePymisp
unknown confidencePymodbus
unknown confidencePypi JSON API
unknown confidencePypistats Org API
unknown confidencePypykatz
unknown confidencePysigma
unknown confidencePyspf
unknown confidencePytector
unknown confidencePython Cryptography Library For Certificate Generation And Ssl Module For TLS Verification Validates Certificate Chains
unknown confidencePython Evtx
unknown confidencePython Fido2
unknown confidencePython Levenshtein
unknown confidencePython Pandas For Statistical Analysis
unknown confidencePython Pandas For Traffic Pattern Analysis And Domain Classification
unknown confidencePython Prefetch
unknown confidencePython Registry
unknown confidencePython Threading
unknown confidencePython Watchdog For Real Time Filesystem Monitoring
unknown confidencePython Websockets
unknown confidencePython
unknown confidenceQpdf
unknown confidenceQradar API
unknown confidenceQradar Assistant
unknown confidenceQradar Pulse
unknown confidenceQradar Use Case Manager
unknown confidenceQradar
unknown confidenceQualys Vmdr
unknown confidenceQueryable Via The Rfc 6962 API At Their Respective Log Urls
unknown confidenceQuerying Status
unknown confidenceQuota Management
unknown confidenceRabin2
unknown confidenceRacepwn
unknown confidenceRadare2
unknown confidenceRakkess
unknown confidenceRansomware Readiness Assessment
unknown confidenceRapid7 Insightvm
unknown confidenceRapidfuzz
unknown confidenceRate Limiting
unknown confidenceRbac Tool
unknown confidenceRbndr Us
unknown confidenceRclone
unknown confidenceRdp
unknown confidenceReactor
unknown confidenceReading Uefi Variables
unknown confidenceRebinder Net
unknown confidenceRebuff
unknown confidenceRecmd
unknown confidenceRecon Ng
unknown confidenceRecorded Future Dark Web Module
unknown confidenceRecorded Future Threat Intelligence
unknown confidenceRecorded Future
unknown confidenceRedirect Chains
unknown confidenceRedis
unknown confidenceRegister Addresses
unknown confidenceRegistry Changes
unknown confidenceRegistry Explorer
unknown confidenceRegistry
unknown confidenceRegripper For Windows Artifacts
unknown confidenceRegripper
unknown confidenceRegulatory Compliance
unknown confidenceRekall
unknown confidenceRekor Cli
unknown confidenceRekor
unknown confidenceRelativity
unknown confidenceReplaced By Intune
unknown confidenceRepos
unknown confidenceRequests
unknown confidenceResemblyzer
unknown confidenceResources
medium confidenceResponder
Open-source LLMNR/NBT-NS/mDNS poisoner and rogue authentication servers used to coerce and capture Windows network credentials and facilitate NTLM relay in Active Directory environments.
unknown confidenceRestic
unknown confidenceResticpy
unknown confidenceRestler
unknown confidenceResults
unknown confidenceRetire Js
unknown confidenceRetirejs
unknown confidenceReverse Lookup
unknown confidenceRisk Based Alerting
unknown confidenceRita
unknown confidenceRkhunter
unknown confidenceRoles
unknown confidenceRopgadget
unknown confidenceRotation
unknown confidenceRoute Leaks
unknown confidenceRoutinator
unknown confidenceRpki
unknown confidenceRsyslog
unknown confidenceRtu
unknown confidenceRubeus
unknown confidenceRubrik Instant Recovery
unknown confidenceRubrik Security Cloud
unknown confidenceRubrik
unknown confidenceRule Compilation
unknown confidenceRule
unknown confidenceRuntime Errors
unknown confidenceS3 Storage Lens
unknown confidenceS3
unknown confidenceS3audit
unknown confidenceS4u2self And S4u2proxy Extensions For Lateral Movement And Privilege Escalation
unknown confidenceS7comm
unknown confidenceSafe Attachments
unknown confidenceSailpoint Identityiq
unknown confidenceSailpoint Rest API
unknown confidenceSailpoint
unknown confidenceSamhain
unknown confidenceSaml Azure Ad
unknown confidenceSandbox Reports
unknown confidenceSans Picerl Framework
unknown confidenceSarif Viewer
unknown confidenceSasquatch
unknown confidenceSaviynt Enterprise Identity Cloud
unknown confidenceSaviynt
unknown confidenceSbecmd And Shellbags Explorer
unknown confidenceScalpel
unknown confidenceScanning
unknown confidenceScapy
unknown confidenceScdbg
unknown confidenceScheduled Tasks
unknown confidenceSchema Analysis
unknown confidenceSchemathesis
unknown confidenceScikit Learn
unknown confidenceScirius
unknown confidenceScorecard
unknown confidenceScoutsuite
unknown confidenceScripting Tests
unknown confidenceScylla
unknown confidenceSearch Engines
unknown confidenceSearchable By Identity
unknown confidenceSearchable By Ip
unknown confidenceSeclists
unknown confidenceSecret Scanning
unknown confidenceSecret Server Rest API
unknown confidenceSecret Server Sdk
unknown confidenceSecretfinder
unknown confidenceSecretsdump Py
unknown confidenceSections
unknown confidenceSecure Boot
unknown confidenceSecure
unknown confidenceSecurity Command Center
unknown confidenceSecurity Compliance Powershell
unknown confidenceSecurityheaders Com
unknown confidenceSecurityheaders
unknown confidenceSecuronix
unknown confidenceSegment
unknown confidenceSel 3620 Ethernet Security Gateway
unknown confidenceSemgrep
unknown confidenceSentinel
unknown confidenceSentinelone
unknown confidenceServer Side Prototype Pollution
unknown confidenceService Accounts
unknown confidenceService Enumeration
unknown confidenceService Principal Names
unknown confidenceServicenow Itsm
unknown confidenceServicenow Performance Analytics
unknown confidenceServicenow
unknown confidenceSession Controls
unknown confidenceSession Recording
unknown confidenceSet Label
unknown confidenceSet
unknown confidenceSetting Pins
unknown confidenceSha256sum
unknown confidenceShare Enumeration
unknown confidenceShares
unknown confidenceShellbags Explorer
unknown confidenceSherlock
unknown confidenceShodan
unknown confidenceSiem Pipelines Use When Building Kernel Level Runtime Security Observability For Linux Hosts Or Kubernetes Clusters
unknown confidenceSiem Platforms Activates For Requests Involving Auditd Analysis
unknown confidenceSiem Splunk
unknown confidenceSiemens Productcert
unknown confidenceSiemens Sinema Remote Connect
unknown confidenceSiga Ot Solutions
unknown confidenceSigcheck
unknown confidenceSigfind
unknown confidenceSigma Rules
unknown confidenceSigma
unknown confidenceSigmahq
unknown confidenceSigstore Policy Controller
unknown confidenceSigstore
unknown confidenceSingle Packet Authorization
unknown confidenceSingularity
unknown confidenceSlither And Mythril To Detect Reentrancy
unknown confidenceSliver Framework
unknown confidenceSliver
unknown confidenceSmartassembly
unknown confidenceSmartctl
unknown confidenceSmbclient
unknown confidenceSmtp
unknown confidenceSmtp4dev
unknown confidenceSmtplib
unknown confidenceSmuggler Py
unknown confidenceSniffer
unknown confidenceSnorby
unknown confidenceSnort 3
unknown confidenceSnort Rules
unknown confidenceSnort
unknown confidenceSns
unknown confidenceSnyk Advisor
unknown confidenceSnyk Cli
unknown confidenceSnyk Iac
unknown confidenceSnyk Open Source
unknown confidenceSnyk
unknown confidenceSoc 2 With Policy As Code
unknown confidenceSocket Io Client
unknown confidenceSod Violation Summaries
unknown confidenceSoftware
unknown confidenceSpectral Feature Extraction
unknown confidenceSpeechbrain
unknown confidenceSpi
unknown confidenceSpiderfoot
unknown confidenceSplunk Attack Analyzer
unknown confidenceSplunk Cim
unknown confidenceSplunk Dashboard Studio
unknown confidenceSplunk Enterprise Security
unknown confidenceSplunk Enterprise
unknown confidenceSplunk Es Adaptive Response
unknown confidenceSplunk Es Risk Based Alerting
unknown confidenceSplunk Es
unknown confidenceSplunk Itsi
unknown confidenceSplunk Soar Rest API To Create Containers
unknown confidenceSplunk Soar
unknown confidenceSplunk Spl
unknown confidenceSplunk Stream
unknown confidenceSplunk Uba
unknown confidenceSplunk With Cip Content Pack
unknown confidenceSplunk
unknown confidenceSpycloud
unknown confidenceSql Queries
unknown confidenceSqlite3
high confidencesqlmap
sqlmap is an automated framework for detecting and exploiting SQL injection vulnerabilities in web applications and services, with extensive DBMS fingerprinting, data enumeration, and post-exploitation capabilities.
unknown confidenceSsdt Analysis
unknown confidenceSSH And Logs Access Attempts
unknown confidenceSsl Certificate
unknown confidenceSsl From Live Or Captured Traffic
unknown confidenceSsl Kill Switch2
unknown confidenceSsl Suitable For Hunting
unknown confidenceSslstrip
unknown confidenceSslstrip2
unknown confidenceSslunpinning
unknown confidenceSsm Automation
unknown confidenceSspm Tools
unknown confidenceSsrf
unknown confidenceSsrfmap
unknown confidenceSstimap
unknown confidenceSsvc Framework
unknown confidenceStarting Activities
unknown confidenceStatus Checking
unknown confidenceSteampipe
unknown confidenceSteghide
unknown confidenceStegoveritas
unknown confidenceStegseek
unknown confidenceStegsolve
unknown confidenceStepsecurity Harden Runner
unknown confidenceStix 2 1
unknown confidenceStix2
unknown confidenceStorage
unknown confidenceStoring
unknown confidenceStp
unknown confidenceStrace
unknown confidenceStrata Cloud Manager
unknown confidenceStream Decompression
unknown confidenceStream Reassembly
unknown confidenceStreams Exe
unknown confidenceStrings
unknown confidenceStyra Das
unknown confidenceSubdomains
unknown confidenceSubfinder
unknown confidenceSubjack
unknown confidenceSubprocess With Shell True
unknown confidenceSuperseded By Scc But Still Referenced In Compliance Frameworks
unknown confidenceSupporting Levenshtein
unknown confidenceSupporting Multi Turn Dialog Control
unknown confidenceSuppress
unknown confidenceSurebackup Verification
unknown confidenceSuricata 7 0
unknown confidenceSuricata Update
unknown confidenceSuricata With Et Open Ics Rules
unknown confidenceSuricata
unknown confidenceSuspicious Files
unknown confidenceSwagger Codegen
unknown confidenceSwagger Ui Detector
unknown confidenceSwaks
unknown confidenceSwg
unknown confidenceSyft
unknown confidenceSymantec Dlp
unknown confidenceSysdig
unknown confidenceSysinternals Autoruns
unknown confidenceSysinternals Handle
unknown confidenceSysinternals Rootkitrevealer
unknown confidenceSysinternals Suite
unknown confidenceSysmon Event Id 10
unknown confidenceSysmon Event Ids 8 And 10 And Edr Process Telemetry
unknown confidenceSysmon V13
unknown confidenceSysmon
unknown confidenceT Pot
unknown confidenceTabletop Exercise Framework
unknown confidenceTabletop Scenarios
unknown confidenceTag Immutability
unknown confidenceTask Tracking
unknown confidenceTaxii2 Client
unknown confidenceTc
unknown confidenceTcp
high confidencetcpdump
A command-line packet capture and analyzer that uses libpcap to sniff, filter, display, and save network traffic in pcap/pcapng formats for security investigation and troubleshooting.
unknown confidenceTcpreplay
unknown confidenceTenable Io
unknown confidenceTenable Nessus
unknown confidenceTenable Ot Security To Identify Vulnerabilities Without Disrupting Industrial Processes Or Crashing Legacy Controllers
unknown confidenceTerrascan
unknown confidenceTestdisk
unknown confidenceTesting
unknown confidenceTestssl Sh
unknown confidenceTetragon
unknown confidenceTfsec
unknown confidenceThc Ipv6 Toolkit
unknown confidenceThe Sleuth Kit
high confidencetheHarvester
theHarvester is an open‑source reconnaissance tool used to passively and selectively actively enumerate emails, subdomains/hosts, IPs and related URLs for a target domain using multiple public data sources.
unknown confidenceThehive Cortex
unknown confidenceThehive
unknown confidenceThen Live Migrates To Production
unknown confidenceThen Replay With Regular User Token To Test Function Level Authorization
unknown confidenceThinkst Canary
unknown confidenceThread Stacks
unknown confidenceThreat Detection
unknown confidenceThreat Intelligence Framework
unknown confidenceThreatconnect Reports
unknown confidenceThreatconnect Tc Exchange
unknown confidenceThreatconnect
unknown confidenceThreatfox
unknown confidenceTidal Cyber
unknown confidenceTimeline Explorer
unknown confidenceTimeline
unknown confidenceTimesketch
unknown confidenceTimestomping
unknown confidenceTines
unknown confidenceTldextract
unknown confidenceTofino Xenon
unknown confidenceTofino
unknown confidenceToken Renewal
unknown confidenceTooling
unknown confidenceToxicity
unknown confidenceTplmap
unknown confidenceTracking Reviewer Progress
unknown confidenceTrellix
unknown confidenceTrend Analysis
unknown confidenceTriggering Behavioral Alerts On Canary Modification
unknown confidenceTripwire Enterprise
unknown confidenceTripwire
unknown confidenceTrivy Action
unknown confidenceTrivy Operator
unknown confidenceTrivy
unknown confidenceTroubleshooting
unknown confidenceTrufflehog V3
unknown confidenceTrufflehog
unknown confidenceTrunking
unknown confidenceTrustkit
unknown confidenceTshark
unknown confidenceTtl
unknown confidenceTurbo Intruder
unknown confidenceU2f
unknown confidenceUbertooth One Ubertooth Btle
unknown confidenceUdp
unknown confidenceUeba
unknown confidenceUefitool
unknown confidenceUncoder Io
unknown confidenceUnified Audit Log
unknown confidenceUnsquashfs
unknown confidenceUpload Timestamps
unknown confidenceUploading
unknown confidenceUpx
unknown confidenceUrl Categorization And Risk Based Routing
unknown confidenceUrl Inspection
unknown confidenceUrl
unknown confidenceUrls
unknown confidenceUrlscan Io
unknown confidenceUrlscan
unknown confidenceUsb C
unknown confidenceUsb Forensic Tracker
unknown confidenceUsbdeview
unknown confidenceUseful For Observing Injection Sequences In Real Time
unknown confidenceUsers
unknown confidenceUsing Error Based Field Discovery
unknown confidenceValence Security For Saas Configuration Monitoring
unknown confidenceVarnish Cli
unknown confidenceVarnishlog
unknown confidenceVault Agent Injector
unknown confidenceVault Agent
unknown confidenceVault Csi Provider
unknown confidenceVault Radar
unknown confidenceVault Secrets Operator
unknown confidenceVb Net
unknown confidenceVector Similarity
unknown confidenceVectr
unknown confidenceVeeam Backup Replication 12
unknown confidenceVeeam Backup Replication
unknown confidenceVeeam Instant Recovery
unknown confidenceVeeam
unknown confidenceVelero
unknown confidenceVelociraptor
unknown confidenceVerify Registration Response
unknown confidenceVerifying Chains
unknown confidenceVerifying Firmware Write Protection
unknown confidenceVerifying Signatures
unknown confidenceVerifying
unknown confidenceVersion History
unknown confidenceVersion Probing
unknown confidenceVersions
unknown confidenceVipermonkey
unknown confidenceVirustotal Integration
unknown confidenceVirustotal
unknown confidenceVisualization
unknown confidenceVmware Workspace One
high confidenceVolatility (Volatility Framework)
Volatility is a Python-based framework for extracting and analyzing digital artifacts from volatile memory snapshots across Windows, Linux, and macOS; Volatility 3 is a modern rewrite that uses symbol tables instead of static profiles and a layered architecture to parse diverse memory image formats.
unknown confidenceVolatility3 Linux Plugins
unknown confidenceVolatility3 Plugins To Identify Nop Sled Patterns
unknown confidenceVolatility3 Plugins
unknown confidenceVpc Flow Logs
unknown confidenceVql Queries
unknown confidenceVtp
unknown confidenceVulnerability Assessment
unknown confidenceVulnerability Findings
unknown confidenceVulnerability Management
unknown confidenceVulnerability Scanning
unknown confidenceVulnerability Tracking
unknown confidenceWaf Bypass Com
unknown confidenceWaf Integration
unknown confidenceWaf Logs
unknown confidenceWaf Security Automations
unknown confidenceWafw00f
unknown confidenceWalletexplorer
unknown confidenceWarp Client
unknown confidenceWatchdog
unknown confidenceWaterfall Security Solutions
unknown confidenceWaterfall Security Unidirectional Gateway
unknown confidenceWaterfall Security
unknown confidenceWayback Machine
unknown confidenceWazuh
unknown confidenceWdac Wizard
unknown confidenceWdac
unknown confidenceWeb Cache Vulnerability Scanner
unknown confidenceWeb Scraping
unknown confidenceWebauthn Io
unknown confidenceWebhook Site
unknown confidenceWebsocat
high confidenceWfuzz
Wfuzz is a Python-based web fuzzer that injects payloads into HTTP requests to discover endpoints, parameters, and behaviors, and to triage responses using flexible filters and output formats.
unknown confidenceWhois
unknown confidenceWildfire
unknown confidenceWindow Size
unknown confidenceWindows Event Forwarding
unknown confidenceWindows Event Viewer
unknown confidenceWindows Exploit Protection
unknown confidenceWindows Scheduled Tasks By Analyzing Task Creation Events
unknown confidenceWindows Security Event Logs
unknown confidenceWinlogbeat
high confidenceWinPEAS
WinPEAS is an open-source Windows host enumeration tool that scans for misconfigurations, weak permissions, and environmental clues that could enable local privilege escalation during penetration testing and red-team assessments.
unknown confidenceWinpmem
unknown confidenceWinprefetchview
unknown confidenceWinrm
unknown confidenceWireguard
unknown confidenceWireshark 4 0
unknown confidenceWireshark Modbus Dissector
unknown confidenceWireshark With Iec 61850 Dissector
high confidenceWireshark
Wireshark is an open-source network protocol analyzer for capturing and interactively analyzing packet data from live interfaces or capture files, with a companion CLI (TShark) and a capture utility (dumpcap).
unknown confidence