Security Utilities
Command directory for Security tools and utilities.
in-toto-sign
in-toto enables the signing and verification of layout files to ensure secure software supply chains.
keychain
Manages the identity timeout settings for enhanced security of stored keys.
login
This command configures login authentication to use locally defined user credentials.
lpass
LastPass CLI tool for managing and accessing entries securely.
minisign
Minisign leverages Base64 encoded public keys for signature verification.
rpcdump.py
`rpcdump.py` enables increased verbosity for diagnostics during RPC enumeration.
vet
Starts the MCP server that utilizes AI for enhanced security postures across cloud environments.
vinmap
Vinmap is a network scanning tool that provides detailed information about the hosts on a specified IP range.
whence
The 'whence -p' command searches for a specified command, disregarding shell built-ins.
cfssl
cfssl allows users to generate and manage certificates from the command line.
checksec
Checksec analyzes current kernel security settings and controls, critical for system hardening assessments.
cmctl
Facilitates certificate management in Kubernetes, ensuring valid certificates are available when needed.
curlie
4+ curlie commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.
desc
Essential for understanding partition structure and validating data integrity within a partitioned environment.
getadusers.py
GetADUsers.py provides capabilities for querying Active Directory users and exporting information for compliance and security analysis.
jwt
Creates a JWT from key-value pairs, designed for user roles and permissions management in secure applications.
katana
Katana allows for precise control over crawling through configurable strategies and limits.
mailsy
The dispose command in Mailsy is intended for secure removal of email accounts.
makepasswd
makepasswd generates passwords composed of specified characters.
nettacker
`nettacker` offers a multi-faceted approach to network scanning, combining responsiveness checks with security evaluations.
rdp_check.py
A script designed for checking RDP access and validating local account credentials.
rekor-cli
Rekor CLI facilitates interactions with transparency logs to search for artifact entries.
secret-tool
4+ secret-tool commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.
sg
sg is a tool to rewrite code and extract the results in JSON format for further processing.
symfony
Symfony security checker scans vendor dependencies for known vulnerabilities.
auditd
Starting auditd on-demand conserves system resources until audits are required.
crypto
This command removes all RSA keys in the device, ensuring a clean state for cryptographic operations.
elasticsearch-saml-metadata
Generates and saves SAML metadata to a specified file, supporting structured documentation.
gpg-zip
gpg-zip allows for creation and management of encrypted zip archives using GPG for secure storage.
grant
Used to manage role assignments in relational databases.
lynis
3+ lynis commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.
oathtool
OATH Tool enables verification of one-time passwords for secure authentication.
ots
The OTS command tool manages secret creation in designated regions to maintain data sovereignty and latency management.
scan-build
scan-build is a command-line tool used to analyze C/C++ code for potential defects.
sslscan
`sslscan --show-certificate` provides detailed insights into the SSL certificate configurations for a target.
xkcdpass
xkcdpass enables secure password generation with interactive customization.
ykinfo
Command to extract capabilities from YubiKey devices.
age-keygen
age-keygen can convert traditional identities to the recipient format used in age encryption.
cockpit-tls
2+ cockpit-tls commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.
dexter
Auth flow for Google OIDC with customizable kube config locations.
gpg-tui
Launching GPG TUI with these flags enhances user interaction through improved readability.
marketplace
Recon-ng simplifies module management with marketplace access for installations.
paperkey
This command reconstructs GPG keys for secure usage, leveraging public key infrastructure.
transport
This command configures terminal lines to accept only Telnet connections, mainly for legacy systems.
use
Modules in Metasploit are categorized objects used for penetration testing and exploitation of vulnerabilities.
aireplay-ng
Aireplay-ng, part of the Aircrack-ng suite, is a tool used for packet injection and deauthentication in wireless network security testing.
db
Recon-ng allows structured data management through a profile-driven approach for intelligence collection.
elasticsearch-syskeygen
Tool for generating secure keys for system authentication. Must be used with caution to avoid security breaches.
freshclam
FreshClam is the command-line tool for checking for virus definition updates in ClamAV.
limine-scan
1+ limine-scan commands with exact syntax, verified examples, and copyable terminal workflows for security tasks.
modules
Recon-ng provides specialized modules for focused reconnaissance tasks, driving data-driven insights.
recon-ng
Recon-ng is a full-featured web reconnaissance framework, enabling data collection and analysis.
run-exploit
Running exploits in Metasploit allows for immediate testing against vulnerabilities and conditions in the target environment.
username
This command establishes a new administrative user account with a designated privilege level and password on Cisco IOS devices.
workspaces
Recon-ng organizes work within workspaces, allowing for segmented information storage.
wuzz
Wuzz facilitates interactive testing of HTTP APIs through a console-based interface.