Explore 2989 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
Want your tool featured here?
Get maximum visibility with pinned placement
MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.
MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.
Gitleaks is a SAST tool for detecting and preventing hardcoded secrets in git repos.
Gitleaks is a SAST tool for detecting and preventing hardcoded secrets in git repos.
A tool for static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers
A tool for static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers
IDAPython plugin for generating Yara rules/patterns from x86/x86-64 code through parameterization.
IDAPython plugin for generating Yara rules/patterns from x86/x86-64 code through parameterization.
Truehunter is a tool designed to detect encrypted containers with a focus on Truecrypt and Veracrypt, utilizing a fast and memory efficient approach.
Truehunter is a tool designed to detect encrypted containers with a focus on Truecrypt and Veracrypt, utilizing a fast and memory efficient approach.
ICSREF is a modular framework that automates reverse engineering of CODESYS v2 industrial control system binaries through binary analysis and library call identification.
ICSREF is a modular framework that automates reverse engineering of CODESYS v2 industrial control system binaries through binary analysis and library call identification.
A secret keeper that stores secrets in DynamoDB, encrypted at rest.
An advanced Content Disarm and Reconstruction software for enhancing computer safety by removing dynamic content from Office files.
An advanced Content Disarm and Reconstruction software for enhancing computer safety by removing dynamic content from Office files.
A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.
A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.
DOS attack by sending fake BPDUs to disrupt switches' STP engines.
DOS attack by sending fake BPDUs to disrupt switches' STP engines.
Learn how to integrate security into Agile development teams for high performance
Learn how to integrate security into Agile development teams for high performance
A lookup service for AS-numbers and prefixes by country
Preparation process for participating in the Pacific Rim CCDC 2015.
Preparation process for participating in the Pacific Rim CCDC 2015.
SANS Institute provides cyber security training, certifications, and degrees to empower cyber security practitioners and teams.
SANS Institute provides cyber security training, certifications, and degrees to empower cyber security practitioners and teams.
Sysreptor offers a customizable reporting solution for penetration testers and red teamers to streamline their security assessments.
Sysreptor offers a customizable reporting solution for penetration testers and red teamers to streamline their security assessments.
CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.
CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.
Calculates RSA parameters and generates RSA private keys in DER or PEM format.
Calculates RSA parameters and generates RSA private keys in DER or PEM format.
Weekly security newsletter with advisories from major software vendors
Weekly security newsletter with advisories from major software vendors
A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.
A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.
A post-exploitation tool for Azure Active Directory and Office 365 environments that manages access tokens and provides interactive access to Microsoft 365 services.
A post-exploitation tool for Azure Active Directory and Office 365 environments that manages access tokens and provides interactive access to Microsoft 365 services.
Sniffglue is a network sniffer tool written in Rust with advanced filter sensitivity options and secure packet processing.
Sniffglue is a network sniffer tool written in Rust with advanced filter sensitivity options and secure packet processing.
A collection of tools that can be used with Honeyd for data analysis or other purposes
A collection of tools that can be used with Honeyd for data analysis or other purposes
Generate a variety of suspect actions detected by Falco rulesets.
Generate a variety of suspect actions detected by Falco rulesets.