Explore 2989 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
Want your tool featured here?
Get maximum visibility with pinned placement
The Cybersecurity and Infrastructure Security Agency (CISA) is a government agency that provides alerts, advisories, and resources to help protect the United States' critical infrastructure from cyber threats.
The Cybersecurity and Infrastructure Security Agency (CISA) is a government agency that provides alerts, advisories, and resources to help protect the United States' critical infrastructure from cyber threats.
Runs IAM policy linting checks against AWS accounts to identify security best practices and policy errors.
Runs IAM policy linting checks against AWS accounts to identify security best practices and policy errors.
Emulate operating systems behind SSH servers for testing automation.
Open-source platform for IT and security teams with flexibility in feature usage and support for various platforms.
Open-source platform for IT and security teams with flexibility in feature usage and support for various platforms.
CLI tool for ThreatCrowd.org with multiple query functions.
Port listener / honeypot in Rust with protocol guessing, safe string display and rudimentary SQLite logging.
Port listener / honeypot in Rust with protocol guessing, safe string display and rudimentary SQLite logging.
In-depth analysis and insights on various cloud security topics by Rhino Security Labs team
In-depth analysis and insights on various cloud security topics by Rhino Security Labs team
A library for working with Windows NT data types, providing access and manipulation functions.
A library for working with Windows NT data types, providing access and manipulation functions.
A modular web application honeypot framework with automation and logging capabilities.
Open source digital forensics tools for analyzing disk images and recovering files.
Open source digital forensics tools for analyzing disk images and recovering files.
wxHexEditor is a free hex editor / disk editor with various data manipulation operations and visualization functionalities.
wxHexEditor is a free hex editor / disk editor with various data manipulation operations and visualization functionalities.
A comprehensive guide for system administrators to detect and identify potential security threats on Windows 2000 systems.
A comprehensive guide for system administrators to detect and identify potential security threats on Windows 2000 systems.
Recorded talks from Hack.lu 2018 covering various cybersecurity topics.
Recorded talks from Hack.lu 2018 covering various cybersecurity topics.
SysmonSearch makes event log analysis more effective by aggregating Microsoft Sysmon logs and providing detailed analysis through Elasticsearch and Kibana.
SysmonSearch makes event log analysis more effective by aggregating Microsoft Sysmon logs and providing detailed analysis through Elasticsearch and Kibana.
de4dot is a .NET deobfuscator and unpacker with the ability to restore packed and obfuscated assemblies to their original form.
de4dot is a .NET deobfuscator and unpacker with the ability to restore packed and obfuscated assemblies to their original form.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.
BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.
A package for capturing and analyzing network flow data and intraflow data.
Binary analysis and management framework for organizing malware and exploit samples.
Binary analysis and management framework for organizing malware and exploit samples.
Leading academic department offering diverse courses and research opportunities.
Leading academic department offering diverse courses and research opportunities.
An extensible network forensic analysis framework with deep packet analysis and plugin support.
An extensible network forensic analysis framework with deep packet analysis and plugin support.
A low-interaction honeypot for detecting and analyzing security threats
Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.
Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.
Weaponizing Kerberos protocol flaws for stealthy attacks on domain users.
Weaponizing Kerberos protocol flaws for stealthy attacks on domain users.