![SessionProbe](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/04123625/sessionprobe-pentesting-tool-1400-400x200.jpg)
SessionProbe: Open-source multi-threaded pentesting tool
SessionProbe is a multi-threaded pentesting tool designed to evaluate user privileges in web applications. It takes a user’s session token and checks for a list of URLs …
![New infosec products of the week](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115321/infosec-week-1200-400x200.jpg)
New infosec products of the week: December 1, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Amazon, Datadog, Entrust, Fortanix, GitHub, Nitrokey, and Paladin Cloud. Amazon One …
![Mosint](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29124308/mosint-osint_tool-400x200.jpg)
Mosint: Open-source automated email OSINT tool
Mosint is an automated email OSINT tool written in Go designed to facilitate quick and efficient investigations of target emails. It integrates multiple services, providing …
![Infosec products of the month](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13115319/infosec-month-1200-400x200.jpg)
Infosec products of the month: November 2023
Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Amazon, Aqua Security, ARMO, Datadog, Devo Technology, Druva, Entrust, …
![Vigil LLM security scanner](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/26162334/vigil-llm-security-scanner-400x200.jpg)
Vigil: Open-source LLM security scanner
Vigil is an open-source security scanner that detects prompt injections, jailbreaks, and other potential threats to Large Language Models (LLMs). Prompt injection arises when …
![AWS Kill Switch](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/23120354/aws_kill_switch2-400x200.jpg)
AWS Kill Switch: Open-source incident response tool
AWS Kill Switch is an open-source incident response tool for quickly locking down AWS accounts and IAM roles during a security incident. The solution includes a Lambda …
![Best EDR of the market](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/19182157/best_edr_of_the_market-1400-400x200.jpg)
Open-source AV/EDR bypassing lab for training and learning
Best EDR Of The Market is a user-mode endpoint detection and response (EDR) project designed to serve as a testing ground for understanding and bypassing EDR’s user-mode …
![PolarDNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/17105116/polardns-400x200.jpg)
PolarDNS: Open-source DNS server tailored for security evaluations
PolarDNS is a specialized authoritative DNS server that allows the operator to produce custom DNS responses suitable for DNS protocol testing purposes. What can you do with …
![HARmor](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/14185952/harmor-hns-400x200.jpg)
HARmor: Open-source tool for sanitizing and securing HAR files
HARmor is an open-source tool that sanitizes HTTP Archive files. Easy to install and run, it enables the safe handling and sharing of HAR files. What are HAR files? HAR files …
![corporate cybersecurity blogs](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/13094049/corporate_cybersecurity_blogs-1400-400x200.jpg)
10 corporate cybersecurity blogs worth your time
In this article, we’ve curated a list of insightful corporate cybersecurity blogs that provide analysis and actionable advice to help you keep your company’s …
![k0smotron](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/07094450/k0smotron-1400-400x200.jpg)
k0smotron: Open-source Kubernetes cluster management
Open-source solution k0smotron is enterprise-ready for production-grade Kubernetes cluster management with two support options. Kubernetes cluster management Management and …
![Trivy](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/06152313/aqua-trivy-1400-400x200.jpg)
Aqua Trivy open-source security scanner now finds Kubernetes security risks
The Aqua Trivy open-source scanner now supports vulnerability scanning for Kubernetes components and Kubernetes Bill of Materials (KBOM) generation. Now, companies can better …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD