A collection of small security-related utilities for analyzing and detecting security vulnerabilities in applications and systems.
This repository is meant to contain various security analysis tools designed to help identify and remediate security issues in software applications. Each tool is focused on a specific security concern and provides detailed analysis and reporting capabilities.
A comprehensive tool for detecting embedded DER private keys in executable files.
Features:
- Binary pattern matching for DER-encoded private keys
- Cross-application comparison to detect shared secrets
- Security risk assessment and detailed reporting
- Support for multiple output formats (text, JSON)
security-tools/
├── README.md # This file
├── private_key_detector/ # Private key detection tool
│ ├── README.md # Tool documentation
│ ├── der_private_key_analyzer.py # Main analyzer script
└── [future tools...] # Additional security tools
-
Clone the repository:
git clone https://github.com/hackolade/security-tools.git cd security-tools
-
Choose a tool:
cd private_key_detector
-
Follow the tool's documentation:
cat README.md
This repository is part of the Hackolade organization's security initiative. Contributions should focus on:
- Small, focused tools for specific security concerns
- Clear documentation and usage examples
- Practical utility for real-world security issues
- Minimal dependencies and easy deployment
When adding a new security tool:
- Create a new directory with a descriptive name
- Include a comprehensive README.md
- Provide usage examples and documentation
- Keep the tool focused on a specific security concern
- Update this main README.md to include the new tool
- Responsible Disclosure: Follow responsible disclosure practices when reporting security vulnerabilities
- Ethical Use: Use these tools only for legitimate security analysis
- Compliance: Ensure usage complies with applicable laws and regulations
- Confidentiality: Respect the confidentiality of sensitive findings
This repository contains security analysis tools. Use responsibly and in accordance with applicable laws and regulations.
For questions or support regarding these security tools:
- Review the tool documentation for detailed usage instructions
- Check the examples for common use cases
- Consult security professionals for complex scenarios
- Follow responsible disclosure practices for security findings
Note: These tools are designed to help identify and remediate security vulnerabilities. Always follow responsible disclosure practices and use these tools ethically and legally.