• -100% Risk Management Framework for Information Systems and Orgaanizations

    Risk Management Framework for Information Systems and Orgaanizations

    Original price was: 1.00₹.Current price is: 0.00₹.
  • Risk Manager
  • ROADTools

    ROADTools

    Framework for interacting with Azure Active Directory (AD)

  • RockNSM

    RockNSM

    RockNSM (Rock Security Network Monitoring) is an open-source network security monitoring (NSM) platform designed for detecting and responding to security threats. It includes a set of tools and technologies to monitor network traffic, analyze logs, and aid in incident detection and response. RockNSM is often used by cybersecurity professionals to enhance network visibility and bolster security efforts.

  • -100% Routing in Fortigate

    Routing in Fortigate

    Original price was: 1.00₹.Current price is: 0.00₹.
  • S3Scanner

    S3Scanner

    Scan for open AWS S3 buckets. S3Scannertool is an automated cyber security tool that is used to scan and dump the data from open buckets of the target domain. This tool is developed in the Python Language.

  • -100% SaaS Governance Best Practices for Cloud Customers

    SaaS Governance Best Practices for Cloud Customers

    Original price was: 1.00₹.Current price is: 0.00₹.
  • -100% SaaS Security Checklist

    SaaS Security Checklist

    Original price was: 1.00₹.Current price is: 0.00₹.
  • ScanExp

    ScanExp

    ScanExp automates the scanning of any machine’s open ports via the ip address and performs a brute force attack on ports 20, 21 for the FTP protocol, port 22 for the SSH protocol and port 25 for the SMTP protocol, providing the choice between the use of two different wordlists for the username and password or two personalized wordlists chosen by the user.

  • Scaninfo

    Scaninfo

    Fast scan for redtools.

  • ScoutSuite

    ScoutSuite

    Multi-Cloud Security Auditing Tool

  • ScubaGear

    ScubaGear

    Developed by CISA, ScubaGear is an assessment tool that verifies a Microsoft 365 (M365) tenant’s configuration conforms to the policies described in the Secure Cloud Business Applications (SCuBA) Security Configuration Baseline documents.