The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

URL Scan Logo

A website scanner that provides a sandbox for the web, allowing users to scan URLs and websites for potential threats and vulnerabilities.

0
Collective Intelligence Framework (CIF) Logo

The FASTEST Way to Consume Threat Intelligence and make it actionable.

0
Damn Vulnerable Linux (DVL) Logo

Linux-based operating system intentionally vulnerable for cybersecurity practice.

0
MetaHub Logo

MetaHub is an open-source vulnerability management tool that provides impact-contextual analysis of security findings in AWS environments through automated contextualization, ownership identification, and prioritization scoring.

0
VolatilityBot Logo

VolatilityBot automates memory dump analysis by extracting executables, detecting code injections, and performing automated malware scanning using YARA and ClamAV.

0
Sonatype Repository Logo

A centralized platform for managing open source components and automating software supply chain security.

0
eCrimeLabs Logo

eCrimeLabs provides a SOAR platform for threat detection and response, integrated with MISP.

0
Sonatype Repository Firewall Logo

Automate software supply chain security by blocking malicious open source components

0
eslint-plugin-anti-trojan-source Logo

ESLint plugin to prevent Trojan Source attacks.

0
Metasploitable3 Logo

A virtual machine with numerous security vulnerabilities for testing exploits with Metasploit.

0
GrokEVT Logo

GrokEVT is a tool for reading Windows event log files and converting them to a human-readable format.

0
Checksec Logo

A bash script that analyzes executable files to check security properties like PIE, RELRO, canaries, ASLR, and Fortify Source protections.

0
CloudFrunt Logo

CloudFrunt identifies misconfigured Amazon CloudFront domains that are vulnerable to hijacking due to improper CNAME configuration.

0
Weave Scope Logo

Weave Scope is a real-time visualization and monitoring tool that automatically maps Docker container infrastructures and microservices, providing interactive topology views and direct container management capabilities.

0
Yara Rule Generator Logo

A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.

0
HTTP Header Live Logo

Firefox browser extension for displaying and editing HTTP headers.

0
Burp-Yara-Rules Logo

A collection of Yara rules for the Burp Yara-Scanner extension that helps identify malicious software and infected web pages during web application security assessments.

0
Google Security Blog Logo

Google's Security Blog provides the latest news and insights on security and safety on the Internet.

0
cred_scanner Logo

A Python command line tool that scans directories for AWS credentials in files, designed for CI/CD integration to prevent credential exposure in builds.

0
rastrea2r Logo

A cybersecurity tool for collecting and analyzing forensic artifacts on live systems.

0
HoneyHTTPD Logo

Python-based web server framework for setting up fake web servers and services with precise data responses.

0
Redexer Logo

Redexer is a reengineering tool that parses, analyzes, and modifies Android DEX files for binary manipulation and permission analysis.

0
Doorman Logo

Doorman is an osquery fleet manager that allows administrators to remotely manage the osquery configurations retrieved by nodes.

0
Workflow Templates Repository Logo

A community repository of workflow templates for the Ayehu NG platform that enables automated IT and business process execution.

0