Explore 2989 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
Want your tool featured here?
Get maximum visibility with pinned placement
Security-Guard helps secure microservices and serverless containers by detecting and blocking exploits.
Security-Guard helps secure microservices and serverless containers by detecting and blocking exploits.
RedELK enhances Red Team operations with SIEM capabilities to monitor and alert on Blue Team activities.
A shell script for basic forensic collection of various artefacts from UNIX systems.
A shell script for basic forensic collection of various artefacts from UNIX systems.
A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.
OpenIAM offers a unified identity governance platform featuring CIAM, MFA, and PAM integration.
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
Tool for managing Yara rules on VirusTotal
A custom activity repository for Ayehu NG automation platform, allowing users to create and modify activities to fit their specific needs.
A custom activity repository for Ayehu NG automation platform, allowing users to create and modify activities to fit their specific needs.
GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
A Rust-based command-line tool for analyzing .apk files to detect vulnerabilities.
A Rust-based command-line tool for analyzing .apk files to detect vulnerabilities.
Script to verify audit settings for Microsoft Defender for Endpoint in GPO.
Script to verify audit settings for Microsoft Defender for Endpoint in GPO.
A tool to find and search for registered CVEs, creating a local CVE database for offline use.
A tool to find and search for registered CVEs, creating a local CVE database for offline use.
CTFd is a Capture The Flag framework with extensive features for creating and managing CTF competitions.
CTFd is a Capture The Flag framework with extensive features for creating and managing CTF competitions.
A collection of Yara signatures for identifying malware and other threats
A collection of Yara signatures for identifying malware and other threats
Webroot Endpoint Protection provides advanced cloud-based protection against malicious files, scripts, exploits, and URLs to keep businesses safe from cyberattacks.
Webroot Endpoint Protection provides advanced cloud-based protection against malicious files, scripts, exploits, and URLs to keep businesses safe from cyberattacks.
Honeypot for analyzing data with customizable services and logging capabilities.
Honeypot for analyzing data with customizable services and logging capabilities.
Curiefense is an application security platform that protects against various threats and offers community involvement.
Curiefense is an application security platform that protects against various threats and offers community involvement.
MaxMind provides accurate IP geolocation and online fraud detection solutions to create safer digital experiences.
MaxMind provides accurate IP geolocation and online fraud detection solutions to create safer digital experiences.
XGuardian XARA Security Scanner for OSX with URL scheme, Bundle ID, and keychain hijack checks.
XGuardian XARA Security Scanner for OSX with URL scheme, Bundle ID, and keychain hijack checks.
A practical guide on NTLM relaying for Active Directory attacks.
A practical guide on NTLM relaying for Active Directory attacks.
Autopsy is a GUI-based digital forensics platform for analyzing hard drives and smart phones, with a plug-in architecture for custom modules.
Autopsy is a GUI-based digital forensics platform for analyzing hard drives and smart phones, with a plug-in architecture for custom modules.
Web inventory tool that captures screenshots of webpages and includes additional features for enhanced usability.
Web inventory tool that captures screenshots of webpages and includes additional features for enhanced usability.
A comprehensive cheat sheet for using JtR (John the Ripper), a password cracking tool.
A comprehensive cheat sheet for using JtR (John the Ripper), a password cracking tool.
TestDisk checks disk partitions and recovers lost partitions, while PhotoRec specializes in recovering lost pictures from digital camera memory or hard disks.
TestDisk checks disk partitions and recovers lost partitions, while PhotoRec specializes in recovering lost pictures from digital camera memory or hard disks.