UNIX-like reverse engineering framework and command-line toolset
-
Updated
Sep 29, 2024 - C
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
UNIX-like reverse engineering framework and command-line toolset
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ https://www.windows-internals.com
Nmap - the Network Mapper. Github mirror of official SVN repository.
Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), Alpha, BPF, Ethereum VM, HPPA, LoongArch, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, TriCore, Webassembly, XCore and X86.
Transmits AM radio on computers without radio transmitting hardware.
WiFi security auditing tools suite
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
State-of-the-art native debugging tools
A self-contained cryptographic library for Python
the TCPdump network dissector
UNIX-like reverse engineering framework and command-line toolset.
A kernel designed to run one and only one application in a virtualized environment
Oct 29 - 30, 2024 • San Francisco, CA
Dependency Automation service by Mend.io
Automatic, daily repo and metadata backup - no maintenance needed: fast restore, DR, AWS, and S3 cloud storage support
GuardRails provides continuous security feedback for modern development teams
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
We help developers write clean code
Backup repositories, metadata and LFS into AWS, Azure, OneDrive, GCP, etc. Pay per repositories, not seats. SOC2 in progress
Runtime Code Review
Find, fix (and prevent!) known vulnerabilities in your code
Code scanning at ludicrous speed. Find bugs and reachable dependency vulnerabilities. Enforce standards on every commit
Protect your app from malicious open source dependencies
Automatic daily backups of your GitHub repos and metadata with on-demand restores to protect your business