Explore 2944 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
A tool for spinning up insecure AWS infrastructure with Terraform for training and security assessment purposes.
A tool for spinning up insecure AWS infrastructure with Terraform for training and security assessment purposes.
A low Interaction Client honeypot designed to detect malicious websites through signature, anomaly and pattern matching techniques.
AWS Cloud Security offers security services and compliance tools for securing data and applications on AWS.
AWS Cloud Security offers security services and compliance tools for securing data and applications on AWS.
A honeypot for the Log4Shell vulnerability (CVE-2021-44228) with various detection and logging features.
BleachBit cleans files to free disk space and maintain privacy with various options and command line interface support.
BleachBit cleans files to free disk space and maintain privacy with various options and command line interface support.
A web-based manager for Yara rules, allowing for storage, editing, and management of Yara rules.
A web-based manager for Yara rules, allowing for storage, editing, and management of Yara rules.
A penetration testing tool for intercepting SSH connections and logging plaintext passwords.
A penetration testing tool for intercepting SSH connections and logging plaintext passwords.
Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.
Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.
A tool for extracting common indicators of compromise from a block of text.
A tool for extracting common indicators of compromise from a block of text.
A compilation of suggested tools for each component in a detection and response pipeline, with real-world examples, to design effective threat detection and response pipelines.
A compilation of suggested tools for each component in a detection and response pipeline, with real-world examples, to design effective threat detection and response pipelines.
BusKill is a laptop kill cord that can trigger your computer to lock or shutdown when it's physically separated from you.
BusKill is a laptop kill cord that can trigger your computer to lock or shutdown when it's physically separated from you.
A textmode sniffer for tracking tcp streams and capturing data in various modes.
A textmode sniffer for tracking tcp streams and capturing data in various modes.
Open Source Threat Intelligence Collector with plugin-oriented framework.
Open Source Threat Intelligence Collector with plugin-oriented framework.
A set of utility programs that monitor and control the SMART system built into modern hard drives, providing proactive measures to prevent data loss.
A set of utility programs that monitor and control the SMART system built into modern hard drives, providing proactive measures to prevent data loss.