Coverage-guided fuzzer.
Find the right cybersecurity tool in seconds.
Search by what you want to do, what you want to do it on, and why.
cyberstars.action(do anything).target(anything).purpose(any purpose)344resultsMake a system look as if it was hit by an APT.
Navigate and annotate MITRE ATT&CK.
AVML
—Acquire volatile memory on Linux.
Wi-Fi security auditing suite.
Safely simulate malicious network traffic.
Image-scaling attacks for multi-modal LLMs.
Python reverse engineering for Android.
Reverse engineer Android APKs.
File triage and malware analysis pipeline.
Small, portable ATT&CK detection tests.
Automated external attack-surface mapping.
Digital forensics platform.
Cloud forensics for Azure / O365.
BYOB
—Build Your Own Botnet (research).
Kill protected EDR processes.
Python AST-based security linter.
Web-based SSH bastion and key manager.
Firmware analysis tool.
Account search across 600+ networks.
Active Directory attack-path graphing.
Bluetooth Low Energy swiss-army knife.
Cloud-native open-source WAF.
Drive Burp Suite from an LLM.