home.social

#securitytools β€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #securitytools, aggregated by home.social.

  1. πŸ” Introducing frida-ui

    A lightweight, web-based user interface built for Frida - designed to make Android application penetration testing more intuitive and efficient.

    πŸ“¦ Easy to get started:
    > uv tool install frida-ui
    > frida-ui

    Check it out on GitHub - github.com/adityatelange/frida

    Available on PyPI: pypi.org/project/frida-ui

    #AndroidSecurity #infosec #Frida #SecurityTools #OpenSource

  2. NiamonX Internet Surface (Beta) is now live β€” a passive, privacy-respecting OSINT & attack-surface intelligence platform built to map real-world exposure at global scale.

    Instead of noisy scans or shallow datasets, the platform merges:
    β€’ internet-wide scanning (β‰ˆ3,000 ports)
    β€’ multi-source enrichment (WHOIS/RDAP, public registries, partner crawlers)
    β€’ deep tech fingerprinting
    β€’ graph-based topology mapping
    β€’ AI-driven risk reports

    The topology graph reveals relationships between IP ranges, domains, ASNs, software stacks, libraries, misconfigurations, and exposed services β€” not just β€œopen ports”.
    Patterns and systemic weaknesses become visible instantly.

    The built-in AI Auditor produces contextual security reports:
    β€’ attack-path analysis
    β€’ CVE clustering & prioritization
    β€’ business impact breakdown
    β€’ actionable remediation roadmap
    A process that normally takes days can now be done in hours.

    The entire system is designed with security & privacy in mind:
    β€’ hardened infrastructure
    β€’ zero request logging
    β€’ no user tracking
    β€’ only quota counters for rate enforcement

    Available across all plans β€” including the free tier.

    If you’re doing OSINT, threat hunting, red/blue team work, or asset discovery, this is a tool worth exploring.

    πŸ”— dash.niamonx.io/internet_surface
    πŸ”— is.niamonx.io

    #OSINT #ThreatIntel #Infosec #AttackSurface #SecurityTools #CyberSecurity #Recon #AI #PassiveRecon #NiamonX

  3. NiamonX Internet Surface (Beta) is now live β€” a passive, privacy-respecting OSINT & attack-surface intelligence platform built to map real-world exposure at global scale.

    Instead of noisy scans or shallow datasets, the platform merges:
    β€’ internet-wide scanning (β‰ˆ3,000 ports)
    β€’ multi-source enrichment (WHOIS/RDAP, public registries, partner crawlers)
    β€’ deep tech fingerprinting
    β€’ graph-based topology mapping
    β€’ AI-driven risk reports

    The topology graph reveals relationships between IP ranges, domains, ASNs, software stacks, libraries, misconfigurations, and exposed services β€” not just β€œopen ports”.
    Patterns and systemic weaknesses become visible instantly.

    The built-in AI Auditor produces contextual security reports:
    β€’ attack-path analysis
    β€’ CVE clustering & prioritization
    β€’ business impact breakdown
    β€’ actionable remediation roadmap
    A process that normally takes days can now be done in hours.

    The entire system is designed with security & privacy in mind:
    β€’ hardened infrastructure
    β€’ zero request logging
    β€’ no user tracking
    β€’ only quota counters for rate enforcement

    Available across all plans β€” including the free tier.

    If you’re doing OSINT, threat hunting, red/blue team work, or asset discovery, this is a tool worth exploring.

    πŸ”— dash.niamonx.io/internet_surface
    πŸ”— is.niamonx.io

    #OSINT #ThreatIntel #Infosec #AttackSurface #SecurityTools #CyberSecurity #Recon #AI #PassiveRecon #NiamonX

  4. ☁️ Cloud Security Toolkit – What Modern Teams Actually Need πŸ›‘οΈ
    The cloud changed everything β€” speed, scale, AND attack surface. Security now happens at runtime, at identity level, and inside every pipeline. If your tools can’t see everything, they’re already failing.

    Core Categories to Lock In:
    β€’ CSPM β†’ Posture & misconfig checks (Prisma Cloud, Wiz, Dome9)
    β€’ CWPP β†’ Runtime protection for VMs & containers (CrowdStrike, Aqua, Trend Micro)
    β€’ CASB β†’ SaaS visibility & data control (Netskope, MS Defender for Cloud Apps)
    β€’ IAM β†’ Hardening identity (AWS IAM, Azure AD, Okta, BeyondTrust)
    β€’ SIEM / Threat Detection β†’ Splunk, Sumo Logic, Datadog + cloud logs
    β€’ Vuln & Config Scanning β†’ Tenable, Trivy, Qualys for IaC & images
    β€’ Secrets Management β†’ HashiCorp Vault, AWS Secrets Manager
    β€’ CI/CD Supply Chain Defense β†’ Snyk, Checkov, GitHub Advanced Security

    🧠 Cloud Rule:
    Attackers don’t break in β€” they log in. Identity is the new perimeter.

    Always what do you guys think ?

    ⚠️ Use responsibly. Test in staging before production. Map every tool to your threat model, compliance framework, and provider stack.

    #CloudSecurity #DevSecOps #CSPM #IAM #CWPP #SIEM #ContainerSecurity #InfoSec #CyberDefense #HacktivateLabs #SecurityTools

  5. ☁️ Cloud Security Tools β€” Essential Toolkit for Modern Teams πŸ›‘οΈπŸš€

    Cloud environments introduce new risks and require specialized tooling to secure workloads, configurations, and data. Use a mix of CSP-native and third-party tools to cover posture management, runtime protection, identity, and visibility. Key categories and examples: Cloud Security Posture Management (CSPM) β€” Prisma Cloud, Dome9, Wiz for misconfig & compliance checks πŸ”; Cloud Workload Protection (CWPP) β€” CrowdStrike, Trend Micro, Aqua for container and VM runtime defense πŸ³πŸ›‘οΈ; Cloud Access Security Broker (CASB) β€” Netskope, Microsoft Defender for Cloud Apps for SaaS visibility & data control β˜οΈπŸ”; Identity & Access Management β€” AWS IAM/Azure AD hardening, BeyondTrust, Okta for strong auth & least privilege πŸ”‘; Threat Detection & SIEM β€” Splunk, Sumo Logic, Datadog + cloud-native logging for alerting and forensics πŸ“Š; Vulnerability & Configuration Scanning β€” Qualys, Tenable, Trivy for images and infra-as-code scanning βš™οΈ; Secrets Management β€” HashiCorp Vault, AWS Secrets Manager for safe key handling πŸ”; and Supply-chain & CI/CD security β€” Snyk, Checkov, GitHub Advanced Security to catch insecure deps and pipelines 🧩.

    ⚠️ Disclaimer:
    For educational & defensive use only. Evaluate tools against your cloud provider, compliance needs, and threat model before deploying. Always test changes in staging before production. πŸš«πŸ”’

    #CloudSecurity #CSPM #CWPP #IAM #DevSecOps #InfoSec #Cloud #CyberSecurity #SecurityTools #Compliance #ContainerSecurity β˜οΈπŸ›‘οΈ

  6. ⚑ FREE Tool: Stop Wasting Time on SIEM Rule Conversions!
    Converting between Snort and Suricata rules? Analyzing complex rule sets?
    da signature parser does it in seconds - not hours! οΏ½οΏ½
    βœ… One-click conversions
    βœ… Smart rule analysis
    βœ… Security-validated
    βœ… 100% FREE
    Built by a security engineer, for security engineers.
    Try it: chickenpwny.github.io/DaSignat
    What's your biggest SIEM pain point? Let's discuss!
    #Cybersecurity #SIEM #SecurityTools #FreeTools

  7. πŸ›‘οΈ Security Scanner for Web Applications
    πŸ”’ Privacy-First Security Analysis πŸ‘©β€πŸ’» Built by Developers, for Developers

    Try it now: webscan.dev

    #SecurityTools #WebSec #DAST