The Largest Platform to Find Cybersecurity Tools

Explore 5692 curated cybersecurity tools, with 14,858 visitors searching for solutions

RECENTLY ADDED

Python3 in one pic Logo

A comprehensive guide to Python 3 syntax, features, and resources in a single image.

0
Pancake Viewer Logo

A DFVFS backed viewer project with a WxPython GUI, aiming to enhance file extraction and viewing capabilities.

0
Pulsedive Logo

Pulsedive is a threat intelligence platform that provides frictionless threat intelligence for growing teams, offering features such as indicator enrichment, threat research, and API integration.

0
BurpSmartBuster Logo

A Burp Suite plugin that performs intelligent content discovery by analyzing current requests to identify directories, files, and variations based on the application's structure.

0
DMG2IMG Logo

DMG2IMG converts Apple compressed DMG archives to standard HFS+ image files supporting zlib, bzip2, and LZFSE compression formats.

0
DumpsterDiver Logo

DumpsterDiver analyzes large datasets to detect hardcoded secrets, keys, and passwords using entropy calculations and customizable search rules.

0
MISP Workbench Tools Logo

Tools to export data from MISP MySQL database for post-incident analysis and correlation.

0
NTFS-Linker Logo

Tool for parsing NTFS journal files, $Logfile, and $MFT.

0
Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach Logo

A comprehensive guide to malware analysis and reverse engineering, covering topics such as lab setup, debugging, and anti-debugging.

0
LunaTrace Logo

LunaTrace is an open source supply chain security tool that monitors software dependencies for vulnerabilities and integrates with GitHub to notify developers of security issues before deployment.

0
Computer Science Courses with Video Lectures Logo

A collection of computer science courses with video lectures covering a wide range of topics.

0
WhatWeb Logo

A next-generation web scanner that identifies websites and recognizes web technologies, including content management systems, blogging platforms, and more.

0
Chaosreader Logo

Chaosreader is a tool for ripping files from network sniffing dumps and replaying various protocols and file transfers.

0
vi Editor Cheat Sheet Logo

A quick reference guide for the VI editor, covering commands and modes.

0
Gatekeeper Library by Psecio Logo

A simple drop-in library for managing users, permissions, and groups in your application.

0
PANORAMA Logo

Generate comprehensive reports about Windows systems with detailed system, security, networking, and USB information.

0
Potiron Logo

Normalize, index, enrich, and visualize network capture data using Potiron.

0
urandom vs. CSPRNG for Crypto Keys Logo

Utilize the kernel's CSPRNG for generating crypto keys instead of userspace CSPRNGs to avoid randomness failures.

0
Zeus AWS Auditing & Hardening Tool Logo

Zeus is an AWS security auditing and hardening tool that evaluates cloud configurations against CIS benchmarks and can automatically apply recommended security settings.

0
BlueBox Malware Analysis Box and Cyber Threat Hunting Logo

Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.

0
Covert Red Team Attack Infrastructure Logo

Back-end component for red team operations with crucial design considerations.

0
Bane Logo

Bane is an automated AppArmor profile generator for Docker containers that simplifies the creation of security policies with file globbing support and Docker integration.

0
msticpy Logo

msticpy is a Python library for InfoSec investigation and threat hunting in Jupyter Notebooks, providing data querying, threat intelligence enrichment, analysis capabilities, and interactive visualizations.

0
Multiple Cybersecurity News and Updates Logo

Catch up on the latest cybersecurity news and updates from around the world.

0