The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

RedELK Logo

RedELK is a SIEM tool designed for red teams to monitor and receive alerts about blue team detection activities during penetration testing engagements.

0
unix_collector Logo

A shell script for basic forensic collection of various artefacts from UNIX systems.

0
DEF CON CTF Archive Logo

A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.

0
OpenIAM Logo

OpenIAM offers a unified identity governance platform featuring CIAM, MFA, and PAM integration.

0
DShield Docker Logo

A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project

0
VT_RuleMGR.py Logo

Tool for managing Yara rules on VirusTotal

0
Custom Activities Repository Logo

A community-driven repository and development framework for creating custom automation activities within the Ayehu NG IT orchestration platform.

0
GHH - Google Hack Honeypot Logo

GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

0
SUPER Android Analyzer Logo

A command-line Android APK vulnerability analyzer written in Rust that decompresses and scans APK files using rule-based detection to identify security issues.

0
MDE-AuditCheck Logo

A script that validates Group Policy Object audit settings required for proper Microsoft Defender for Endpoint functionality.

0
CVE Ape Logo

CVE Ape is an open source tool that creates a local CVE database from the National Vulnerability Database for offline vulnerability searching by package name, vendor, or OS components.

0
CTFd Logo

CTFd is a web-based framework for creating and managing Capture The Flag cybersecurity competitions with customizable challenges, scoring systems, and team management capabilities.

0
Yara Signatures Logo

A collection of Yara signatures for identifying malware and other threats

0
OpenText Core Endpoint Protection Logo

Cloud-based endpoint protection using machine learning and threat intel

0
VerySimpleHoneypot Logo

Honeypot for analyzing data with customizable services and logging capabilities.

0
Curiefense Logo

Curiefense is an application security platform that extends Envoy proxy to protect web applications and APIs against SQL injection, XSS, DDoS, and other common threats.

0
maxmind.com Logo

MaxMind provides accurate IP geolocation and online fraud detection solutions to create safer digital experiences.

0
XGuardian XARA Security Scanner Logo

XGuardian XARA Security Scanner for OSX with URL scheme, Bundle ID, and keychain hijack checks.

0
Practical Guide to NTLM Relaying in 2017 Logo

A practical guide on NTLM relaying for Active Directory attacks.

0
The Sleuth Kit & Autopsy Logo

Autopsy is a GUI-based digital forensics platform for analyzing hard drives and smart phones, with a plug-in architecture for custom modules.

0
WitnessMe Logo

Web inventory tool that captures screenshots of webpages and includes additional features for enhanced usability.

0
John the Ripper Cheat Sheet Logo

A comprehensive cheat sheet for using JtR (John the Ripper), a password cracking tool.

0
TestDisk and PhotoRec Logo

TestDisk checks disk partitions and recovers lost partitions, while PhotoRec specializes in recovering lost pictures from digital camera memory or hard disks.

0
ThreatConnect Developer Documentation Logo

Developer documentation providing REST API and SDK resources for ThreatConnect platform integration across Python, Java, and JavaScript environments.

0