[go: up one dir, main page]

Results for: command injection

Suggested Categories:

Emergency Management Software
Emergency management software, also known as crisis management software, enables organizations, companies, public agencies, and emergency response personnel to manage emergencies and offers solutions to prevent, reduce, manage, and get ready for emergencies and crises.
Speech Recognition Software
Speech recognition software uses artificial intelligence to interpret and recognize human speech. It is used in a variety of applications, such as transcription services, voice command systems, and automated customer service programs. The technology works by analyzing input sound waves and mapping them to a database of known words or phrases to generate an output.

17 Products for "command injection"

  • 1
    FuzzDB

    FuzzDB

    FuzzDB

    ... OS command injection, directory listings, directory traversals, source exposure, file upload bypass, authentication bypass, XSS, HTTP header crlf injections, SQL injection, NoSQL injection, and more. For example, FuzzDB catalogs 56 patterns that can potentially be interpreted as a null byte and contains lists of commonly used methods and name-value pairs that trigger debug modes.
    Starting Price: Free
  • 2
    WebReaver

    WebReaver

    Websecurify

    WebReaver is an elegant, easy to use and fully-automated, web application security security testing tool for Mac, Windows and Linux, suitable for novice as well as advanced users. WebReaver allows you easily test any web application for a large variety of web vulnerabilities from the sever kinds such as SQL Injection, local and remote file Includes, command Injection, cross-site scripting and expression Injection to the less severe ones such as variety of session and headers problems...
  • 3
    sqlmap

    sqlmap

    sqlmap

    sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. Support...
  • 4
    PHP Secure

    PHP Secure

    PHP Secure

    ... Secure detects the most common and dangerous types: -SQL injection vulnerabilities -Command Injection -Cross-Site Scripting (XSS) Vulnerabilities -PHP Serialize Injections -Remote Code Executions -Double Escaping -Directory Traversal -Regular Expression Denial of Service (ReDos)
  • 5
    MCP Defender

    MCP Defender

    MCP Defender

    ... security measures. MCP Defender identifies and blocks common AI security threats, including prompt injection, credential theft, arbitrary code execution, and remote command injection. It supports integration with various AI applications such as Cursor, Claude, Visual Studio Code, and Windsurf, with more applications to be supported in the future. It offers intelligent threat detection, alerting users as soon as it identifies any malicious activity being performed by AI apps.
    Starting Price: Free
  • 6
    AdRestore

    AdRestore

    Microsoft

    Windows Server 2003 introduces the ability to restore deleted ("tombstoned") objects. This simple command-line utility enumerates the deleted objects in a domain and gives you the option of restoring each one. Source code is based on sample code in the Microsoft Platform SDK. ADInsight is an LDAP (Light-weight Directory Access Protocol) real-time monitoring tool aimed at troubleshooting Active Directory client applications. Use its detailed tracing of Active Directory client
  • 7
    Espanso

    Espanso

    Espanso

    No more copy and pasting, create templates once and let Espanso do the rest for you. Customer support replies, sales pitches, medical reports, you name it. Espanso got you covered. Extend Espanso’s capabilities with packages, or create your owns and share them with the community on the Espanso Hub. For advanced use-cases, you can extend Espanso’s snippets with shell commands or custom scripts. No more copy-pasting from the terminal, inject the output into applications directly. Use forms...
  • 8
    AccuKnox

    AccuKnox

    AccuKnox

    .../BareMetal or local Kubernetes orchestrated cluster or unorchestrated pure-containerized cluster. If any ransomware attacker tries to compromise the security of the pod and gets access to the vault pod, they can do a command injection and encrypt the secrets stored in the volume mount points. Then the organizations have to pay millions of dollars to get back their secrets decrypted.
    Starting Price: $999 per month
  • 9
    Baidu AI Cloud Intrustion Detection System
    Based on the full-flow image and big data processing technology, the IDS can analyze the flow log authorized by the user, via a bypass. Also, it can identify the web application attack quickly and profoundly mines the remote command execution, web shell backdoor, and sensitive file leakage attacks against the web by hackers, and make the alarm accurately. Furthermore, it saves the original web traffic log and audit report, meeting the audit requirements for cybersecurity classified protection...
  • 10
    Mercury Editor

    Mercury Editor

    Mercury Editor

    Mercury is a full featured HTML5 editor. It was built from the ground up to help your team get the most out of content editing in modern browsers. Mercury comes bundled as a Rails Engine, so just include it in your Gemfile. Or download the current bundled package if you're not using Rails. We don't inject javascript or css into your production pages so you're free to use whatever frameworks you want without having to worry about conflicts. Easily add or remove toolbar items or create entirely...
  • 11
    LoopBack

    LoopBack

    LoopBack

    A highly extensible Node.js and TypeScript framework for building APIs and microservices. A brand new LoopBack core to deliver great extensibility and flexibility written in TypeScript/ES2017. Create powerful APIs easily with a new creative experience for defining REST APIs and handling API requests/responses. A new, improved programming model with dependency injection and new concepts such as components, mixins, repositories, etc. make this the most extensible version yet. The LoopBack 4 CLI...
  • 12
    garak

    garak

    garak

    garak checks if an LLM can be made to fail in a way we don't want. garak probes for hallucination, data leakage, prompt injection, misinformation, toxicity generation, jailbreaks, and many other weaknesses. garak's a free tool, we love developing it and are always interested in adding functionality to support applications. garak is a command-line tool, it's developed in Linux and OSX. Just grab it from PyPI and you should be good to go. The standard pip version of garak is updated periodically...
    Starting Price: Free
  • 13
    CI Fuzz

    CI Fuzz

    Code Intelligence

    CI Fuzz ensures robust and secure code with test coverage up to 100%. Use CI Fuzz from the command line or in the IDE of choice to generate thousands of test cases automatically. CI Fuzz analyzes code as it runs, just like a unit test, but with AI support to efficiently cover all paths through the code. Uncover real bugs in real-time and say goodbye to theoretical issues and false positives. Find real issues with all the information needed to quickly reproduce and fix them. Test your code...
    Starting Price: €30 per month
  • 14
    promptfoo

    promptfoo

    promptfoo

    ... jailbreaks and prompt injections. Move quickly with a command-line interface, live reloads, and caching. No SDKs, cloud dependencies, or logins. Used by teams serving millions of users and supported by an active open source community. Build reliable prompts, models, and RAGs with benchmarks specific to your use case. Secure your apps with automated red teaming and pentesting. Speed up evaluations with caching, concurrency, and live reloading.
    Starting Price: Free
  • 15
    XBOW

    XBOW

    XBOW

    XBOW is an AI-powered offensive security platform that autonomously discovers, verifies, and exploits vulnerabilities in web applications without human intervention. By executing high-level commands against benchmark descriptions and reviewing outputs it solves a wide array of challenges, from CBC padding oracle and IDOR attacks to remote code execution, blind SQL injection, SSTI bypasses, and cryptographic exploits, achieving success rates up to 75 percent on standard web security benchmarks...
  • 16
    Droidrun

    Droidrun

    Droidrun

    ... conversational commands; recorded workflows can be auto-replayed at high speed. Credential management securely stores login information once for reuse, and the system integrates with existing stacks like LLMs, N8N, or custom scripts to inject real app execution into broader automation pipelines. Developers get SDK examples (including Python integrations with Gemini or Ollama) for embedding Droidrun into their tooling.
  • 17
    Rafter

    Rafter

    Rafter

    Rafter is a developer-friendly security scanning platform that lets you detect and address vulnerabilities in your GitHub repositories with a single click or command. It integrates seamlessly via a browser-based dashboard, CLI, or REST API to scan JavaScript, TypeScript, and Python code for a range of issues, including exposed API keys, SQL injection, XSS flaws, insecure dependencies, hardcoded credentials, and authentication weaknesses. Results are clearly categorized into “Errors,” “Warnings...
    Starting Price: $39
  • Previous
  • You're on page 1
  • Next