software
![Realm](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152013/realm-1500-400x200.webp)
Realm: Open-source adversary emulation framework
Realm is an open-source adversary emulation framework emphasizing scalability, reliability, and automation. It’s designed to handle engagements of any size. “Realm …
![X](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/10171257/x-twitter-1500-400x200.webp)
How AI-powered software spreads Russian disinformation on X
The US Justice Department (DoJ) has seized two US-based domains used by Russian threat actors to create fake profiles on X (formerly Twitter) that would spread disinformation …
![BunkerWeb](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152006/bunkerweb-open_source-waf-400x200.webp)
BunkerWeb: Open-source Web Application Firewall (WAF)
BunkerWeb is an open-source Web Application Firewall (WAF) distributed under the AGPLv3 free license. The solution’s core code is entirely auditable by a third party and …
![Monocle](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/01211022/monocle-llm-1500-400x200.webp)
Monocle: Open-source LLM for binary analysis search
Monocle is open-source tooling backed by a large language model (LLM) for performing natural language searches against compiled target binaries. Monocle can be provided with a …
![Secator](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24212032/secator-1500-400x200.webp)
Secator: Open-source pentesting Swiss army knife
Secator is an open-source task and workflow runner tailored for security assessments. It facilitates the use of numerous security tools and aims to enhance the efficiency of …
![Portainer](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/21125740/portainer_docker_kubernetes-1500-400x200.webp)
Portainer: Open-source Docker and Kubernetes management
Portainer Community Edition is an open-source, lightweight service delivery platform for containerized applications. It enables the management of Docker, Swarm, Kubernetes, …
![Gitleaks](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/22164528/gitleaks-1500-400x200.webp)
Gitleaks: Open-source solution for detecting secrets in your code
Gitleaks is an open-source SAST tool designed to detect and prevent hardcoded secrets such as passwords, API keys, and tokens in Git repositories. With more than 15 million …
![GitHub](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/21124934/github-door-1500-400x200.webp)
Developer errors lead to long-term exposure of sensitive data in Git repos
Credentials, API tokens, and passkeys – collectively referred to as secrets – from organizations around the globe were exposed for years, according to Aqua Security’s …
![Zeek](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/18165958/zeek-1500-400x200.webp)
Zeek: Open-source network traffic analysis, security monitoring
Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a versatile ‘sensor’ that can be a …
![Cilium](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/17112651/cilium-1500-400x200.webp)
Cilium: Open-source eBPF-based networking, security, observability
Cilium is an open-source, cloud-native solution that leverages eBPF technology in the Linux kernel to provide, secure, and monitor network connectivity between workloads. What …
![SELKS](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/17154145/selks-stamust_networks-1500-400x200.webp)
SELKS: Open-source Suricata IDS/IPS, network security monitoring, threat hunting
SELKS is a free, open-source, turnkey solution for Suricata-based network intrusion detection and protection (IDS/IPS), network security monitoring (NSM), and threat hunting. …
![Ghidra](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/08165257/ghidra-1500-400x200.webp)
Ghidra: Open-source software reverse engineering framework
Ghidra, a cutting-edge open-source software reverse engineering (SRE) framework, is a product of the National Security Agency (NSA) Research Directorate. The framework …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders