Skip to content
  • THREAT RESEARCH BLOG
  • TOOLS
  • RESOURCES
  • THREAT ANALYSIS SERVICE

CYBERARK LABS

Innovation From the Cutting Edge of Cyber Security Research.

TOOLS

Scan Kubernetes clusters for containers with privileged accounts, privileged containers and sensitive mounts.

LEARN MORE >

Advanced discovery of domain privileged accounts and Shadow Admins.

LEARN MORE >

Discover and target the most privileged entities in Azure and AWS.

LEARN MORE >

Detect on-premises privileged account risks and vulnerabilities.

LEARN MORE >

Detect and abuse domain accounts associated with SPNs.

LEARN MORE >

Detect DLL hijacking in running processes, services and in their binaries.

LEARN MORE >

Detect suspicious privileged NTLM connections such as “Pass-The-Hash” attacks.

LEARN MORE >

A Python tool that implements the Golden SAML attack.

LEARN MORE >

A CLI client for Kubelet.

LEARN MORE >

Automated security assessment tool for Windows application control rules.

LEARN MORE >

Discover suspicious creation forms and usage of temporary tokens in AWS.

LEARN MORE >

Find accounts using common and default passwords in Active Directory.

LEARN MORE >

Identify risky Kerberos delegation configurations.

LEARN MORE >

Discover potential “HotSpots” for credential theft.

LEARN MORE >

A WinDBG extension to help manage VMware and Virtualbox snapshots from within your debugger.

LEARN MORE >

azure-header

Find exposed data in Azure Blob Storage.

LEARN MORE >

kubesploit

Cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated to containerized environments.

LEARN MORE >

FOLLOW US
Copyright © 2023 CyberArk Software Ltd. All rights reserved. Terms and Conditions Privacy PolicyCoordinated Disclosure PolicySecurity Advisories