Template-based vulnerability scanner.
Find the right cybersecurity tool in seconds.
Search by what you want to do, what you want to do it on, and why.
cyberstars.action(do anything).target(anything).purpose(any purpose)344resultsContinuous fuzzing for open source.
Dependency vulnerability scanner.
In-depth attack surface mapping.
Modern intentionally vulnerable web app.
Automated pentest + vuln scanner.
Open-source threat modeling.
Open-source web app scanner.
Completely ridiculous API (training target).
Runtime mobile exploration via Frida.
Anonymous file share + chat over Tor.
Policy-as-code across the stack.
Benchmark prompt-injection attacks on LLMs.
Open adversarial exposure validation.
Open cyber threat intelligence platform.
Decentralized, modular honeypot.
Direct Memory Access attack toolkit.
PEDA
—Python Exploit Development Assistance for GDB.
Evaluate IAM permissions in AWS.
PTF
—Pentest Testers Framework installer.
Pacu
—Open-source AWS exploitation framework.
Burp extension for parameter discovery.
C++ library for packet capture and crafting.
OSINT framework for phone numbers.