![BinDiff](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/25115630/bindiff-1400-400x200.jpg)
BinDiff: Open-source comparison tool for binary files
BinDiff is a binary file comparison tool to find differences and similarities in disassembled code quickly. It was made open source today. With BinDiff, you can identify and …
![LLM Guard](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/15203531/llm-guard-1400-400x200.jpg)
LLM Guard: Open-source toolkit for securing Large Language Models
LLM Guard is a toolkit designed to fortify the security of Large Language Models (LLMs). It is designed for easy integration and deployment in production environments. It …
![Bruschetta-Board](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/07180642/bruschetta-board-1400-400x200.jpg)
Bruschetta-Board: Multi-protocol Swiss Army knife for hardware hackers
Bruschetta-Board is a device for all hardware hackers looking for a fairly-priced all-in-one debugger and programmer that supports UART, JTAG, I2C & SPI protocols and …
![MITRE Caldera for OT](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/06081339/mitre-caldera-ot-1400-400x200.jpg)
MITRE Caldera for OT now available as extension to open-source platform
MITRE Caldera for OT is now publicly available as an extension to the open-source Caldera platform, allowing security teams to run automated adversary emulation exercises that …
![Reaper](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/30113610/reaper-open-source-400x200.jpg)
Reaper: Open-source reconnaissance and attack proxy workflow automation
Reaper is an open-source reconnaissance and attack proxy, built to be a modern, lightweight, and efficient equivalent to Burp Suite/ZAP. It focuses on automation, …
![Velociraptor](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/28145845/velociraptor-digital-forensics-1400-400x200.jpg)
Velociraptor: Open-source digital forensics and incident response
Velociraptor is a sophisticated digital forensics and incident response tool designed to improve your insight into endpoint activities. Velociraptor enables you to conduct …
![open-source OSINT tools](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/21114803/open-source_osint_tools-1400-400x200.jpg)
8 open-source OSINT tools you should try
Open-Source Intelligence (OSINT) refers to gathering, assessing, and interpreting public information to address specific intelligence queries. All the tools listed here are …
![findlargedir](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/15091936/findlargedir-1400-400x200.jpg)
Findlargedir: Find all “blackhole” directories with a huge amount of filesystem entries
Findlargedir is a tool written to help quickly identify “black hole” directories on any filesystem having more than 100k entries in a single flat structure. When a …
![CNAPPgoat](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/02083619/cnappgoat-1400-400x200.jpg)
Assess multi-cloud security with the open-source CNAPPgoat project
Ermetic released CNAPPgoat, an open-source project that allows organizations to test their cloud security skills, processes, tools, and posture in interactive sandbox …
![Bloodhound](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/26093431/bloodhound-pentesting-400x200.jpg)
Open-source penetration testing tool BloodHound CE released
SpecterOps released version 5.0 of BloodHound Community Edition (CE), a free and open-source penetration testing solution that maps attack paths in Microsoft Active Directory …
![Unix-like Artifacts Collector (UAC)](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/21085505/unc-1200-400x200.jpg)
UAC: Live response collection script for incident response
Unix-like Artifacts Collector (UAC) is a live response collection script for incident response that makes use of native binaries and tools to automate the collection of AIX, …
![North Korea](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/21143809/north_korea-400x200.jpg)
North Korean hackers targeted tech companies through JumpCloud and GitHub
North Korean state-sponsored hackers have been linked to two recent cyberattack campaigns: one involving a spear-phishing attack on JumpCloud and the other targeting tech …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD