software
![GreySpark](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110735/greyspark-400x200.jpg)
Measuring IT security health with GreySpark
In this podcast recorded at Black Hat USA 2016, Brit Wanick, Vice President of Sales, FourV Systems, talks about measuring IT security health with GreySpark. GreySpark …
![SimpleRisk](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110811/simplerisk-400x200.jpg)
SimpleRisk: Enterprise risk management simplified
In this podcast recorded at Black Hat USA 2016, Josh Sokol, creator of SimpleRisk, talks about his risk management tool, which he presented at the Black Hat Arsenal. Written …
![L0phtCrack](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110759/lophtcrack-400x200.png)
L0phtCrack 7 audits passwords up to 500 times faster
L0pht Holdings released a completely revamped L0phtCrack 7, which includes a new cracking engine which takes optimal advantage of multi-core CPUs and multi-core GPUs. A 4-core …
![CodexGigas](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110829/codexgigas-400x200.jpg)
CodexGigas: Malware profiling search engine
CodexGigas is a free malware profiling search engine powered by Deloitte Argentina, which allows malware analysts to explore malware internals and perform searches over a …
![linux tux](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195038/linux-tux-400x200.jpg)
Linux kernel development: How fast it’s going and who is doing it
The Linux Foundation analyzed the work done by over 13,500 developers over more than a decade, to provide insight into the Linux kernel development trends and methodologies …
![threat hunting](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113059/threat-hunting-400x200.jpg)
Open sourced: Cyber reasoning system that won third place in DARPA’s Cyber Grand Challenge
Earlier this month, the DARPA-backed Cyber Grand Challenge (CGC) has shown that a future in which computer systems will (wholly or partially) replace bug hunters and patchers …
![WhatsYourSign](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110941/whatsyoursign-400x200.jpg)
Display the cryptographic signing information about any file on your Mac
Verifying a file’s cryptographic signature can help the user deduce its trustability. If you’re using OS X, there is no simple way to view a file’s signature from …
![Sn1per](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111000/sn1per-400x200.jpg)
Sn1per: Automated pentest recon scanner
Sn1per is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. “I originally created Sn1per because I didn’t want …
![Google Duo](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111006/google-duo-400x200.jpg)
Google Duo: Simple, encrypted, video calling app
Google Duo is a simple 1-to-1 video calling app available for Android and iOS. In order to use Google Duo all you need is your phone number, no separate account is necessary. …
![myLG](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111011/mylg-400x200.jpg)
myLG: Open source command line network diagnostic tool
myLG (my Looking Glass) is an open source utility that combines the functions of different network probes into one network diagnostic tool. It comes as a single binary with no …
![Keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195218/keyboard-1-400x200.jpg)
Build serverless, secure apps in the cloud
Swirlds released the SDK for the hashgraph distributed consensus platform, which is free for download (the registration fields are optional). This software development …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113053/fire3-400x200.jpg)
USBFILTER: Packet-level firewall for blocking USB-based threats
The problem of planted malicious USB devices is compounded by the fact that, no matter what, users will rarely stop to think and ultimately choose not to insert them because …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?