• Cloud Katana – a tool developed by Microsoft to automate the execution of adversarial techniques in Azure with the help of Azure Functions with the main goal to validate detection rules and learn the underlying behavior of an attack.
  • Cloud Sniper – a platform designed to manage Cloud Security Operations, intended to respond to security incidents.
  • Kubestriker – a blazing fast security auditing tool for Kubernetes
  • REW-sploit – a tool to analyze Windows shellcode or attacks originating from the Metasploit or Cobalt Strike offensive tools.
  • LUDA – standing for “Large URLs Dataset Analyzer,”. The tool can be used by security teams to spot URLs schemes associated to known malware strains or threat actors.
  • SGXRay – an automated tool developed by Baidu engineers to detect SGX enclave bugs rooting from violations of trusted boundaries.
  • Cotopaxi – a tool developed by Samsung for testing the security of various IoT protocols.
  • Packet Sender – an open-source utility available for Windows, Mac, and Linux to allow sending and receiving TCP, UDP, and SSL packets.
  • Kubesploit – a tool for pen-testing the security of Kubernetes clusters, complete with a post-exploitation HTTP/2 C2 Server and agent.
  • Siembol – open-source, real-time SIEM tool based on big data technologies.
  • Cloudtopolis – a tool for running a password-cracking system on the Google Cloud Shell platform.
  • Racketeer – a tool to provide a way for security teams to simulate and test detection of common ransomware operation, in a controlled manner, against a set of company assets and network endpoints.
  • Phishmonger – is an email phishing tool that allows penetration testers to quickly template, test, and deploy phishing campaigns.
  • Blue Pigeon – a Bluetooth-based data exfiltration and proxy tool.
  • Magpie – an open-source cloud security posture management (CSPM) tool meant to help companies secure cloud infrastructure.
  • PurpleSharp 2.0 – a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments.
  • WARCannon – a tool to search the internet at scale for web vulnerabilities. Security researchers and bug bounty hunters can leverage WARCannon to scale their research horizontally across the entire internet in a fast, cost effective, and entirely non-invasive/invisible way.
  • PMapper – a script and library for identifying risks in the configuration of AWS IAM for an AWS account or an AWS organization.
  • Ping Castle – a tool for performing security audits on Active Directory servers.
  • reNgine – an automated reconnaissance framework meant information gathering during penetration testing of web applications.
  • Solitude – an open-source privacy analysis tool that aims to help people inspect where their private data goes once it leaves their favorite mobile or web applications.