Security News

PRevent: Open-source tool to detect malicious code in pull requests
2025-02-20 14:35

Apiiro security researchers have released open source tools that can help organizations detect malicious code as part of their software development lifecycle: PRevent (a scanner for pull...

Kunai: Open-source threat hunting tool for Linux
2025-02-19 06:00

Kunai is an open-source tool that provides deep and precise event monitoring for Linux environments. “What sets Kunai apart is its ability to go beyond simple event generation. While most security...

Orbit: Open-source Nuclei security scanning and automation platform
2025-02-17 05:30

Orbit is an open-source platform built to streamline large-scale Nuclei scans, enabling teams to manage, analyze, and collaborate on security findings. It features a SvelteKit-based web frontend...

SysReptor: Open-source penetration testing reporting platform
2025-02-12 05:00

SysReptor is a customizable open-source penetration testing reporting platform built for pentesters, red teamers, and cybersecurity professionals. You can optimize your workflow by simplifying,...

Beelzebub: Open-source honeypot framework
2025-02-10 04:30

Beelzebub is an open-source honeypot framework engineered to create a secure environment for detecting and analyzing cyber threats. It features a low-code design for seamless deployment and...

BadDNS: Open-source tool checks for subdomain takeovers
2025-02-03 05:00

BadDNS is an open-source Python DNS auditing tool designed to detect domain and subdomain takeovers of all types. BadDNS modules cname – Check for dangling CNAME records and interrogate them for...

ExtensionHound: Open-source tool for Chrome extension DNS forensics
2025-01-30 05:00

Traditional monitoring tools reveal only traffic from the Chrome process, leaving security teams uncertain about which extension is responsible for a suspicious DNS query. ExtensionHound solves...

North Koreans clone open source projects to plant backdoors, steal credentials
2025-01-29 23:29

Stealing crypto is so 2024. Supply-chain attacks leading to data exfil pays off better? North Korea's Lazarus Group compromised hundreds of victims across the globe in a massive secret-stealing...

BloodyAD: Open-source Active Directory privilege escalation framework
2025-01-28 05:00

BloodyAD is an open-source Active Directory privilege escalation framework that uses specialized LDAP calls to interact with domain controllers. It enables various privilege escalation techniques...

Don’t let these open-source cybersecurity tools slip under your radar
2025-01-27 05:00

This article showcases free, open-source cybersecurity tools that help you identify and address vulnerabilities, detect intrusion, protect websites from cyber attacks, monitor and detect...