Modern, malleable C2 framework.
Trouvez le bon outil de cybersécurité en quelques secondes.
Cherchez par ce que vous voulez faire, sur quoi, et pourquoi.
cyberstars.action(agir).target(sur n'importe quoi).purpose(tout contexte)344resultsWindows event log threat hunter.
Open-source HTTP toolkit for sec research.
Chrome/Chromium browser forensics.
OSINT-driven hostname discovery.
MCP bridge between IDA Pro and LLMs.
IPED
—Open-source digital forensics processor.
Hex editor for reverse engineers.
Python toolkit for Windows protocols.
Open-source adversary emulation platform.
Open-source secrets + cert + PAM platform.
Manage threat intel at scale.
JADX
—Dex-to-Java decompiler.
Standalone Java decompiler GUI.
Coverage-guided fuzzer (Win/macOS/Linux/Android).
CPU-based password cracker.
Next-generation crawling framework.
Kerberos username enumeration and brute-forcing.
Java decompiler and assembler.
Static analysis for Kubernetes manifests.
First open-source K8s security platform.
Kubernetes-native policy engine.
Linux privilege-escalation enumerator.
Curated kernel privesc exploit database.