Security Utilities

Command directory for Security tools and utilities.

$
Sort:
Popularity
Popularity
Popularity
A-Z
I
5

in-toto-sign

in-toto enables the signing and verification of layout files to ensure secure software supply chains.

Security
K
5

keychain

Manages the identity timeout settings for enhanced security of stored keys.

Security
L
5

login

This command configures login authentication to use locally defined user credentials.

Security
L
5

lpass

LastPass CLI tool for managing and accessing entries securely.

Security
M
5

minisign

Minisign leverages Base64 encoded public keys for signature verification.

Security
R
5

rpcdump.py

`rpcdump.py` enables increased verbosity for diagnostics during RPC enumeration.

Security
V
5

vet

Starts the MCP server that utilizes AI for enhanced security postures across cloud environments.

Security
V
5

vinmap

Vinmap is a network scanning tool that provides detailed information about the hosts on a specified IP range.

Security
W
5

whence

The 'whence -p' command searches for a specified command, disregarding shell built-ins.

Security
C
4

cfssl

cfssl allows users to generate and manage certificates from the command line.

Security
C
4

checksec

Checksec analyzes current kernel security settings and controls, critical for system hardening assessments.

Security
C
4

cmctl

Facilitates certificate management in Kubernetes, ensuring valid certificates are available when needed.

Security
C
4

curlie

4+ curlie commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.

Security
D
4

desc

Essential for understanding partition structure and validating data integrity within a partitioned environment.

Security
G
4

getadusers.py

GetADUsers.py provides capabilities for querying Active Directory users and exporting information for compliance and security analysis.

Security
J
4

jwt

Creates a JWT from key-value pairs, designed for user roles and permissions management in secure applications.

Security
K
4

katana

Katana allows for precise control over crawling through configurable strategies and limits.

Security
M
4

mailsy

The dispose command in Mailsy is intended for secure removal of email accounts.

Security
M
4

makepasswd

makepasswd generates passwords composed of specified characters.

Security
N
4

nettacker

`nettacker` offers a multi-faceted approach to network scanning, combining responsiveness checks with security evaluations.

Security
R
4

rdp_check.py

A script designed for checking RDP access and validating local account credentials.

Security
R
4

rekor-cli

Rekor CLI facilitates interactions with transparency logs to search for artifact entries.

Security
S
4

secret-tool

4+ secret-tool commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.

Security
S
4

sg

sg is a tool to rewrite code and extract the results in JSON format for further processing.

Security
S
4

symfony

Symfony security checker scans vendor dependencies for known vulnerabilities.

Security
A
3

auditd

Starting auditd on-demand conserves system resources until audits are required.

Security
C
3

crypto

This command removes all RSA keys in the device, ensuring a clean state for cryptographic operations.

Security
E
3

elasticsearch-saml-metadata

Generates and saves SAML metadata to a specified file, supporting structured documentation.

Security
G
3

gpg-zip

gpg-zip allows for creation and management of encrypted zip archives using GPG for secure storage.

Security
G
3

grant

Used to manage role assignments in relational databases.

Security
L
3

lynis

3+ lynis commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.

Security
O
3

oathtool

OATH Tool enables verification of one-time passwords for secure authentication.

Security
O
3

ots

The OTS command tool manages secret creation in designated regions to maintain data sovereignty and latency management.

Security
S
3

scan-build

scan-build is a command-line tool used to analyze C/C++ code for potential defects.

Security
S
3

sslscan

`sslscan --show-certificate` provides detailed insights into the SSL certificate configurations for a target.

Security
X
3

xkcdpass

xkcdpass enables secure password generation with interactive customization.

Security
Y
3

ykinfo

Command to extract capabilities from YubiKey devices.

Security
A
2

age-keygen

age-keygen can convert traditional identities to the recipient format used in age encryption.

Security
C
2

cockpit-tls

2+ cockpit-tls commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.

Security
D
2

dexter

Auth flow for Google OIDC with customizable kube config locations.

Security
G
2

gpg-tui

Launching GPG TUI with these flags enhances user interaction through improved readability.

Security
M
2

marketplace

Recon-ng simplifies module management with marketplace access for installations.

Security
P
2

paperkey

This command reconstructs GPG keys for secure usage, leveraging public key infrastructure.

Security
T
2

transport

This command configures terminal lines to accept only Telnet connections, mainly for legacy systems.

Security
U
2

use

Modules in Metasploit are categorized objects used for penetration testing and exploitation of vulnerabilities.

Security
A
1

aireplay-ng

Aireplay-ng, part of the Aircrack-ng suite, is a tool used for packet injection and deauthentication in wireless network security testing.

Security
D
1

db

Recon-ng allows structured data management through a profile-driven approach for intelligence collection.

Security
E
1

elasticsearch-syskeygen

Tool for generating secure keys for system authentication. Must be used with caution to avoid security breaches.

Security
F
1

freshclam

FreshClam is the command-line tool for checking for virus definition updates in ClamAV.

Security
L
1

limine-scan

1+ limine-scan commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.

Security
M
1

modules

Recon-ng provides specialized modules for focused reconnaissance tasks, driving data-driven insights.

Security
R
1

recon-ng

Recon-ng is a full-featured web reconnaissance framework, enabling data collection and analysis.

Security
R
1

run-exploit

Running exploits in Metasploit allows for immediate testing against vulnerabilities and conditions in the target environment.

Security
U
1

username

This command establishes a new administrative user account with a designated privilege level and password on Cisco IOS devices.

Security
W
1

workspaces

Recon-ng organizes work within workspaces, allowing for segmented information storage.

Security
W
1

wuzz

Wuzz facilitates interactive testing of HTTP APIs through a console-based interface.

Security