Coverage-guided fuzzer.
Trouvez le bon outil de cybersécurité en quelques secondes.
Cherchez par ce que vous voulez faire, sur quoi, et pourquoi.
cyberstars.action(agir).target(sur n'importe quoi).purpose(tout contexte)344resultsMake a system look as if it was hit by an APT.
Navigate and annotate MITRE ATT&CK.
AVML
—Acquire volatile memory on Linux.
Wi-Fi security auditing suite.
Safely simulate malicious network traffic.
Image-scaling attacks for multi-modal LLMs.
Python reverse engineering for Android.
Reverse engineer Android APKs.
File triage and malware analysis pipeline.
Small, portable ATT&CK detection tests.
Automated external attack-surface mapping.
Digital forensics platform.
Cloud forensics for Azure / O365.
BYOB
—Build Your Own Botnet (research).
Kill protected EDR processes.
Python AST-based security linter.
Web-based SSH bastion and key manager.
Firmware analysis tool.
Account search across 600+ networks.
Active Directory attack-path graphing.
Bluetooth Low Energy swiss-army knife.
Cloud-native open-source WAF.
Drive Burp Suite from an LLM.