Explore 2944 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Dispatch helps manage security incidents by integrating with existing tools and automating incident response tasks.
Dispatch helps manage security incidents by integrating with existing tools and automating incident response tasks.
IBM QRadar is a SIEM solution for real-time threat detection.
A comprehensive PowerShell cheat sheet covering various tasks and techniques for file management, process management, network operations, and system administration.
A comprehensive PowerShell cheat sheet covering various tasks and techniques for file management, process management, network operations, and system administration.
Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.
Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.
A Docker analysis tool for identifying potential security vulnerabilities and weaknesses in Docker environments
A Docker analysis tool for identifying potential security vulnerabilities and weaknesses in Docker environments
Dump the contents of the location database files on iOS and macOS with output options like KML and CSV.
Dump the contents of the location database files on iOS and macOS with output options like KML and CSV.
A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.
A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.
Define and validate YARA rule metadata with CCCS YARA Specification.
Define and validate YARA rule metadata with CCCS YARA Specification.
Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.
Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.
Ice provides a birds-eye view of cloud resources and usage patterns in AWS.
Zui is a desktop app for exploring and working with data, powered by Zed's 'Super-Structured Data' approach.
Zui is a desktop app for exploring and working with data, powered by Zed's 'Super-Structured Data' approach.
A vulnerable by design infrastructure on Azure featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfigurations.
A vulnerable by design infrastructure on Azure featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfigurations.
CobaltBus enables Cobalt Strike C2 traffic via Azure Servicebus for enhanced covert operations.
CobaltBus enables Cobalt Strike C2 traffic via Azure Servicebus for enhanced covert operations.