Security Utilities

Command directory for Security tools and utilities.

$
Sort:
Popularity
Popularity
Popularity
A-Z
E
193

echo

This command sends a message to a specified multicast address over UDP.

Security
B
66

btrfs

66+ btrfs commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.

Security
I
47

ibmcloud

Fetches the version details of the installed IBM Cloud CLI, essential for support and troubleshooting.

Security
Y
47

yadm

Outputs the current configuration settings utilized by the yadm tool for examination.

Security
O
46

openssl

This command converts certificates between DER and PEM formats, allowing for compatibility across various systems.

Security
M
41

mimikatz

41+ mimikatz commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.

Security
Y
25

ykman

YubiKey Manager (ykman) is a command-line tool to manage YubiKeys, allowing operations such as token resets, configuration, and key management.

Security
A
17

amass

Amass is an open-source tool for DNS enumeration and network mapping, essential for discovering external assets related to security assessments.

Security
A
12

ast-grep

Ast-grep is a command-line tool for searching code patterns using Abstract Syntax Tree (AST) parsing, supporting specific languages.

Security
G
12

gpg

This command enables the export of GPG secret keys for storage or transfer.

Security
H
12

hping3

hping3 is a command-line oriented TCP/IP packet assembler and analyzer aimed at robust protocol testing and analysis.

Security
D
9

doas

doas allows users to reauthorize for executing commands with elevated privileges efficiently, maintaining a secure operational environment.

Security
A
8

arp-scan

arp-scan is a network scanner for ARP probing. It identifies live hosts on a local network using the Address Resolution Protocol.

Security
C
8

chkrootkit

Chkrootkit provides an array of tests to detect rootkits, useful for system integrity verification.

Security
C
8

clamdscan

clamdscan: Command for scanning and managing malware threats.

Security
C
8

clamscan

ClamAV is an open-source antivirus engine designed for detecting trojans, viruses, and other malicious threats.

Security
C
8

cosign

This command is crucial for maintaining security standards during image migration, ensuring that signatures accompany the image throughout the transfer.

Security
E
8

elasticsearch-certutil

The `elasticsearch-certutil` allows for creation of custom passwords for securing keystores.

Security
G
8

gopass

gopass supports searching capabilities across its password entries for quick retrieval.

Security
G
8

gpg-card

The GPG card can be factory reset to remove all keys and settings, preparing it for fresh use.

Security
G
8

grype

Grype's help command aids in understanding usage and syntax for effective operation.

Security
J
8

john

John the Ripper’s mechanism to resume cracked password sessions.

Security
K
8

keepassxc-cli

KeePassXC CLI is a command-line tool for interacting with KeePass databases.

Security
M
8

masscan

Masscan is a high-speed port scanner for large network ranges, banner grabbing, rate-controlled scans, exclusions, and exportable discovery results.

Security
O
8

oauth2c

oauth2c: Command-line tool for OAuth 2.0 authentication.

Security
R
8

rbw

Generates secure passwords suitable for various applications, adaptable based on user-defined parameters.

Security
R
8

rpcmap.py

rpcmap.py allows the execution of RPC commands with a debug flag for detailed output.

Security
R
8

rustscan

Greppable mode enhances output for seamless integration with parsing tools.

Security
S
8

ssh-keygen

`ssh-keygen` is used for generating and managing SSH keys, and it includes options for converting key formats.

Security
S
8

step

This command provides assistance for using various CLI subcommands effectively.

Security
S
8

swaylock

swaylock: A lightweight screen locker that integrates well with Wayland.

Security
T
8

trivy

Trivy analyzes filesystem directories for vulnerabilities, focusing on security misconfigurations and possible exploit paths.

Security
T
8

trufflehog

TruffleHog helps uncover hidden secrets within Docker images during the build and deployment process.

Security
W
8

wfuzz

A utility for managing and displaying encoders provided within the wfuzz framework.

Security
W
8

wpscan

WPScan integrates with the WPVulnDB API, providing a method to check for the latest vulnerabilities affecting WordPress sites.

Security
E
7

elasticsearch-keystore

Upgrade the keystore format to align with the requirements of the latest Elasticsearch version, ensuring compatibility with new features.

Security
F
7

flask-unsign

The `flask-unsign` command allows for unsigning session cookies using user-defined wordlists.

Security
O
7

openvpn

OpenVPN offers a robust set of configuration options enabling secure point-to-point or site-to-site connections.

Security
R
7

rsactftool.py

RsaCtfTool is used for advanced cryptographic operations and key recovery.

Security
S
7

serve

Displays help information regarding the command-line options available for the serve tool.

Security
V
7

vault

HashiCorp Vault command to seal the vault server.

Security
Y
7

yek

Yek provides enhanced directory listing capabilities including headers for better visibility.

Security
A
6

age

Age is a modern, simple, and secure file encryption CLI tool designed to replace GnuPG for local file encryption.

Security
C
6

certbot

6+ certbot commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.

Security
G
6

getnpusers.py

An alias command to execute the GetNPUsers.py script.

Security
G
6

gunicorn

Gunicorn can serve web applications securely over HTTPS, utilizing SSL certificates specified at runtime.

Security
H
6

hyperfine

Hyperfine is a command-line benchmarking tool that helps you time your command-line applications and compare their performance.

Security
K
6

kinit

kinit provides capabilities to authenticate via keytab files, essential for non-interactive sessions.

Security
M
6

medusa

Medusa is tailored for parallel brute-force testing against numerous authentication protocols, including SMB, allowing quick password validation.

Security
P
6

pwgen

pwgen is a tool for generating passwords, ensuring compliance with security requirements.

Security
S
6

sambapipe.py

sambapipe.py enables interaction with Samba services using named pipes. Useful for advanced file sharing and data manipulation tasks.

Security
S
6

sops

SOPS (Secrets OPerationS) is used for managing and securing sensitive information effectively.

Security
T
6

testssl

TestSSL can verify whether mail or other services support the STARTTLS command for securing connections.

Security
T
6

trust

6+ trust commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.

Security
X
6

xfreerdp

6+ xfreerdp commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.

Security
E
5

elasticsearch-users

Allows administrators to delete a user from Elasticsearch by specifying the username.

Security
F
5

frida

Frida's codeshare provides a repository for scripts contributed by the community, facilitating rapid testing and development.

Security
F
5

fscrypt

5+ fscrypt commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.

Security
G
5

getuserspns.py

Requests service tickets for access using Pass-the-Hash credentials.

Security
G
5

gpgconf

Reloads configuration settings for GnuPG components without requiring a full restart, ensuring agile configuration management.

Security