ruri calculates the CRC-32 of a file and checks it against the filename.
Read more
The Linux Portal Site
ruri calculates the CRC-32 of a file and checks it against the filename.
Read more
snitch is a friendlier ss / netstat for humans. It lets you inspect network connections with a clean TUI or styled tables.
Read more
Kyanos is an eBPF-based network issue analysis tool that enables you to capture network requests, such as HTTP, Redis, and MySQL requests.
Read more
why2 is billed as a lightweight, fast, secure, and easy to use encryption system.
Read more
Letmein is a port knocker with a simple and secure authentication mechanism. It can be used to harden against pre-authentication attacks.
Read more
This roundup focuses on memory tools that help with forensics. Only free and open source software is eligible for inclusion here.
Read more
AutoTimeliner lets you automagically extract forensic timeline from volatile memory dumps
Read more
Remote Authentication Dial In User Service (RADIUS) is a networking protocol that offers centralized connection authentication, authorization, and accounting management for various types of network access.
Read more
Secrets management tools let you securely store, manage, and monitor sensitive information like passwords, API keys, and certificates.
Read more
yarp is yet another registry parser written in the Python programming language.
Read more
Volshell is a utility to access the volatility framework interactively with a specific memory image.
Read more
fnox lets you manage secrets with encryption or cloud providers—or both.
Read more
pypykatz is a cross-platform implementation of Mimikatz written in Python.
Read more
EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.
Read more
Here’s some useful software for performing security testing. Only free and open source software is eligible for inclusion here.
Read more
AVML is an X86_64 userland volatile memory acquisition tool written in Rust, intended to be deployed as a static binary.
Read more
Trivy is a comprehensive and versatile security scanner. It looks for security issues, and targets where it can find those issues.
Read more
Network Monitor is real-time network connection monitoring tool displaying active connections with live I/O statistics
Read more
passless is a software FIDO2 authenticator that emulates a hardware security key. It’s built with soft-fido2
Read more
Security is paramount. Security involves defence in depth. Approaching security one step at a time, with consistency and rigour, you can mitigate threats, and keep intruders at bay.
Read more