![Sniffnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/31182750/sniffnet-1500-400x200.webp)
Sniffnet: Free, open-source network monitoring
Sniffnet is a free, open-source network monitoring tool to help you easily track your Internet traffic. What sets it apart is its strong focus on user experience. Unlike most …
![TotalRecall](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/05111839/totalrecall-windows11-400x200.webp)
TotalRecall shows how easily data collected by Windows Recall can be stolen
Ethical hacker Alexander Hagenah has created TotalRecall, a tool that demonstrates how malicious individuals could abuse Windows’ newly announced Recall feature to steal …
![free cybersecurity tools](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/28153310/free_cybersecurity_tools-1500-400x200.webp)
20 free cybersecurity tools you might have missed
Free, open-source cybersecurity tools have become indispensable to protecting individuals, organizations, and critical infrastructure from cyber threats. These tools are …
![Encrypted Notepad](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/27164954/encrypted-notepad-1500-400x200.webp)
Encrypted Notepad: Open-source text editor
Encrypted Notepad, an open-source text editor, ensures your files are saved and loaded encrypted with AES-256. With no ads, no network connection required, and no unnecessary …
![RansomLord](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/26124714/ransomlord-anti-ransomware-1500-400x200.webp)
RansomLord: Open-source anti-ransomware exploit tool
RansomLord is an open-source tool that automates the creation of PE files, which are used to exploit ransomware pre-encryption. “I created RansomLord to demonstrate …
![Chronon](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/20123409/chronon-data_platform-1500-400x200.webp)
Chronon: Open-source data platform for AI/ML applications
Chronon is an open-source, end-to-end feature platform designed for machine learning (ML) teams to build, deploy, manage, and monitor data pipelines for machine learning. …
![GitHub](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/27111139/github-27042023-01-400x200.jpg)
GitHub fixes maximum severity Enterprise Server auth bypass bug (CVE-2024-4985)
A critical, 10-out-of-10 vulnerability (CVE-2024-4985) allowing unrestricted access to vulnerable GitHub Enterprise Server (GHES) instances has been fixed by Microsoft-owned …
![Authelia](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/15095211/authelia-open_source-400x200.webp)
Authelia: Open-source authentication and authorization server
Authelia is an open-source authentication and authorization server that offers 2FA and SSO for applications through a web portal. It works alongside reverse proxies to permit, …
![Grafana](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/19183444/grafana-open_source-400x200.webp)
Grafana: Open-source data visualization platform
Grafana is an open-source solution for querying, visualizing, alerting, and exploring metrics, logs, and traces regardless of where they are stored. Grafana provides tools to …
![git](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/19125253/git-19012023-04-400x200.jpg)
Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)
New versions of Git are out, with fixes for five vulnerabilities, the most critical (CVE-2024-32002) of which can be used by attackers to remotely execute code during a …
![OWASP dep-scan](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/10120942/owasp_dep-scan-1500-400x200.webp)
OWASP dep-scan: Open-source security and risk audit tool
OWASP dep-scan is an open-source security and risk assessment tool that leverages information on vulnerabilities, advisories, and licensing restrictions for project …
![BLint](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/08094431/blint-1500-400x200.webp)
BLint: Open-source tool to check the security properties of your executables
BLint is a Binary Linter designed to evaluate your executables’ security properties and capabilities, utilizing LIEF for its operations. From version 2, BLint can also …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders