Explore 2989 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
Want your tool featured here?
Get maximum visibility with pinned placement
Open source penetration testing tool for detecting and exploiting command injection vulnerabilities.
Open source penetration testing tool for detecting and exploiting command injection vulnerabilities.
A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.
A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.
A tool to prevent prototype poisoning in JSON parsing.
Absolute Security provides a comprehensive cybersecurity platform that offers endpoint-to-network access coverage, automated security compliance, and secure endpoint and access solutions.
Absolute Security provides a comprehensive cybersecurity platform that offers endpoint-to-network access coverage, automated security compliance, and secure endpoint and access solutions.
A platform for creating and managing fake phishing campaigns to raise awareness and train users to identify suspicious emails.
A platform for creating and managing fake phishing campaigns to raise awareness and train users to identify suspicious emails.
Enhance your Android experience with the AMAaaS Agent APK for better performance and improved user experience.
Enhance your Android experience with the AMAaaS Agent APK for better performance and improved user experience.
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.
A command line tool that counts Amazon resources across regions and displays the results in a friendly format.
A command line tool that counts Amazon resources across regions and displays the results in a friendly format.
Emulates Docker HTTP API with event logging and AWS deployment script.
Emulates Docker HTTP API with event logging and AWS deployment script.
A program to log login attempts on Telnet (port 23) and track the Mirai botnet
A program to log login attempts on Telnet (port 23) and track the Mirai botnet
An API for constructing and injecting network packets with additional functionality.
An API for constructing and injecting network packets with additional functionality.
A tool for testing Cross Site Scripting vulnerabilities
A collection of write-ups from Capture The Flag hacking competitions
Suricata offers real-time intrusion detection, intrusion prevention, and network monitoring.
Suricata offers real-time intrusion detection, intrusion prevention, and network monitoring.
Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.
Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.
Receive important notifications and updates related to North American electric grid security.
Receive important notifications and updates related to North American electric grid security.
Incident response and digital forensics tool for transforming data sources and logs into graphs.
Incident response and digital forensics tool for transforming data sources and logs into graphs.
tfsec is being replaced by Trivy, a more comprehensive open-source security solution
tfsec is being replaced by Trivy, a more comprehensive open-source security solution
A public incident response process documentation used at PagerDuty
A public incident response process documentation used at PagerDuty
DFIR ORC Documentation provides detailed instructions for setting up the build environment and deploying the tool.
DFIR ORC Documentation provides detailed instructions for setting up the build environment and deploying the tool.
Tools and documentation for validating hardware security requirements on x86 platforms, including bootable USB key creation and platform configuration verification.
Tools and documentation for validating hardware security requirements on x86 platforms, including bootable USB key creation and platform configuration verification.
F-Secure Blog provides in-depth articles and research on cybersecurity threats and best practices.
F-Secure Blog provides in-depth articles and research on cybersecurity threats and best practices.
A multi-threaded AWS security-focused inventory collection tool with comprehensive resource coverage and efficient data collection methods.