open source
![BIND 9](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/25082541/bind9-1500-400x200.webp)
BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
BIND (Berkeley Internet Name Domain) is an open-source DNS software system with an authoritative server, a recursive resolver, and related utilities. BIND 9.20, a stable …
![Infisical](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/11091752/infisical-1500-color-400x200.webp)
Infisical: Open-source secret management platform
Infisical is an open-source secret management platform developers use to centralize application configurations and secrets, such as API keys and database credentials, while …
![Shuffle Automation](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/10135440/shuffle_automation-1500-400x200.webp)
Shuffle Automation: Open-source security automation platform
Shuffle is an open-source automation platform designed by and for security professionals. While security operations are inherently complex, Shuffle simplifies the process. …
![Grype](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152010/grype-scanner-1500-400x200.webp)
Grype: Open-source vulnerability scanner for container images, filesystems
Grype is an open-source vulnerability scanner designed for container images and filesystems that seamlessly integrates with Syft, a powerful Software Bill of Materials (SBOM) …
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/12155822/cloud-security-400x200.webp)
Signatures should become cloud security history
It’s becoming evident that the legacy practice of signature-based threat detection needs to be improved for cloud security challenges. In this Help Net Security video, …
![SubSnipe](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/07154904/subsnipe-1500-400x200.webp)
SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
SubSnipe is an open-source, multi-threaded tool to help find subdomains vulnerable to takeover. It’s simpler, produces better output, and has more fingerprints than …
![Realm](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152013/realm-1500-400x200.webp)
Realm: Open-source adversary emulation framework
Realm is an open-source adversary emulation framework emphasizing scalability, reliability, and automation. It’s designed to handle engagements of any size. “Realm …
![BunkerWeb](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152006/bunkerweb-open_source-waf-400x200.webp)
BunkerWeb: Open-source Web Application Firewall (WAF)
BunkerWeb is an open-source Web Application Firewall (WAF) distributed under the AGPLv3 free license. The solution’s core code is entirely auditable by a third party and …
![Monocle](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/01211022/monocle-llm-1500-400x200.webp)
Monocle: Open-source LLM for binary analysis search
Monocle is open-source tooling backed by a large language model (LLM) for performing natural language searches against compiled target binaries. Monocle can be provided with a …
![Secator](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/24212032/secator-1500-400x200.webp)
Secator: Open-source pentesting Swiss army knife
Secator is an open-source task and workflow runner tailored for security assessments. It facilitates the use of numerous security tools and aims to enhance the efficiency of …
![Portainer](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/21125740/portainer_docker_kubernetes-1500-400x200.webp)
Portainer: Open-source Docker and Kubernetes management
Portainer Community Edition is an open-source, lightweight service delivery platform for containerized applications. It enables the management of Docker, Swarm, Kubernetes, …
![Gitleaks](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/22164528/gitleaks-1500-400x200.webp)
Gitleaks: Open-source solution for detecting secrets in your code
Gitleaks is an open-source SAST tool designed to detect and prevent hardcoded secrets such as passwords, API keys, and tokens in Git repositories. With more than 15 million …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege