open source
![RiskInDroid](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/29100746/riskindroid-1500-400x200.webp)
RiskInDroid: Open-source risk analysis of Android apps
RiskInDroid (Risk Index for Android) is an open-source tool for quantitative risk analysis of Android applications based on machine learning techniques. How RiskInDroid works …
![GitHub](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/27111139/github-27042023-01-400x200.jpg)
GitHub push protection now on by default for public repositories
GitHub push protection – a security feature aimed at preventing secrets such as API keys or tokens getting accidentally leaked online – is being switched on by …
![open source security](https://img.helpnetsecurity.com/wp-content/uploads/2022/04/13072028/open_source_security-400x200.jpg)
Securing software repositories leads to better OSS security
Malicious software packages are found on public software repositories such as GitHub, PyPI and the npm registry seemingly every day. Attackers use a number of tricks to fool …
![PyRIT](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25142811/pyrit-2-1400-400x200.jpg)
PyRIT: Open-source framework to find risks in generative AI systems
Python Risk Identification Tool (PyRIT) is Microsoft’s open-source automation framework that enables security professionals and machine learning engineers to find risks …
![BobTheSmuggler](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/23173144/bobthesmuggler-1400-400x200.jpg)
BobTheSmuggler: Open-source tool for undetectable payload delivery
BobTheSmuggler is an open-source tool designed to easily compress, encrypt, and securely transport your payload. It basically enables you to hide a payload in plain sight. …
![Androids book](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/22084859/androids-book-400x200.jpg)
Inside the book: Androids – The Team That Built the Android Operating System
In 2004, Android was two people who wanted to build camera software but couldn’t get investors interested. Android is a large team at Google today, delivering an OS to …
![Web Check](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/23141702/web_check_1400-400x200.jpg)
Web Check: Open-source intelligence for any website
Web Check offers thorough open-source intelligence and enables users to understand a website’s infrastructure and security posture, equipping them with the knowledge to …
![TruffleHog](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/13134910/trufflehog-1400-400x200.jpg)
TruffleHog: Open-source solution for scanning secrets
TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a research tool I …
![CVE Prioritizer](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/12143410/cve_prioritizer-1400-400x200.jpg)
CVE Prioritizer: Open-source tool to prioritize vulnerability patching
CVE Prioritizer is an open-source tool designed to assist in prioritizing the patching of vulnerabilities. It integrates data from CVSS, EPSS, and CISA’s KEV catalog to …
![Fabric](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/12085024/fabric-open-source-ai-framework-400x200.jpg)
Fabric: Open-source framework for augmenting humans using AI
Fabric is an open-source framework, created to enable users to granularly apply AI to everyday challenges. Key features “I created it to enable humans to easily augment …
![SiCAT](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/05095216/sicat-1400-400x200.jpg)
SiCat: Open-source exploit finder
SiCat is an open-source tool for exploit research designed to source and compile information about exploits from open channels and internal databases. Its primary aim is to …
![SOAPHound](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/30175652/soaphound-1400-400x200.jpg)
SOAPHound: Open-source tool to collect Active Directory data via ADWS
SOAPHound is an open-source data collection tool capable of enumerating Active Directory environments through the Active Directory Web Services (ADWS) protocol. How SOAPHound …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD