Ban hosts that fail auth too often.
Outils pour endpoints
Workstations, servers and EDR-managed devices.
122 tools indexed
Runtime security for containers.
Open vulnerability management platform.
Adversary tradecraft detection on Windows.
Osquery-powered device management.
Dynamic instrumentation for app analysis.
Mandiant's password-cracking frontend.
Security advisories + PoCs from Google.
Open-source phishing toolkit.
Open log management.
HELK
—The Hunting ELK stack.
Windows hardening for high-risk users.
Modern, malleable C2 framework.
Windows event log threat hunter.
Chrome/Chromium browser forensics.
IPED
—Open-source digital forensics processor.
Open-source adversary emulation platform.
Manage threat intel at scale.
CPU-based password cracker.
Linux privilege-escalation enumerator.
Curated kernel privesc exploit database.
Visualize Windows logon events.
Loki
—Simple IOC and YARA scanner.
Linux / macOS / Unix security auditor.