The Largest Platform to Find Cybersecurity Tools

Browse 6,400 the largest platform to find cybersecurity tools tools

RECENTLY ADDED

Rudder Logo

A comprehensive IT infrastructure automation platform for managing hybrid infrastructure through configuration, patch, and security management.

0
KeeFarce Logo

KeeFarce extracts cleartext password database information from KeePass 2.x processes in memory using DLL injection and .NET runtime manipulation.

0
Cuckoo Sandbox Logo

Leading open source automated malware analysis system.

0
Serving Random Payloads with Apache mod_rewrite Logo

A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

0
ConsoleMe Logo

ConsoleMe is a web service that simplifies AWS IAM permissions and credential management across multiple accounts through self-service workflows and centralized administration.

0
PacketStreamer Logo

High-performance remote packet capture and collection tool used for forensic analysis in cloud workloads.

0
CredStash Logo

CredStash is a credential management tool that securely stores and retrieves sensitive information using AWS KMS encryption.

0
AirIAM Logo

AirIAM analyzes AWS IAM usage patterns and generates least-privilege Terraform configurations to optimize cloud access management.

0
Netis Cloud Probe Logo

An open source packet capture and forwarding tool that captures network packets on one machine and sends them to another for remote monitoring and analysis.

0
Reversing With Lena (Tutorials) Logo

Educational resources for reverse engineering tutorials by lena151.

0
libevtx Logo

A library to access and parse Windows XML Event Log (EVTX) format, useful for digital forensics and incident response.

0
auspex Logo

A graph-based tool for visualizing AWS access permissions and resource relationships to identify potential attack paths and privilege escalation opportunities.

0
Dicompot Logo

A DICOM server with a twist, blocking C-STORE attempts for protection but logging them.

0
TrailBlazer Logo

TrailBlazer analyzes AWS CloudTrail logging behavior by systematically testing API calls across services to determine what gets logged and how it appears in CloudTrail.

0
Windows Commands Abused by Attackers Logo

Malware allows attackers to execute Windows commands from a remote environment

0
ocaml-yara by Elastic Logo

OCaml bindings to the YARA scanning engine for integrating YARA scanning capabilities into OCaml projects

0
Luyten Logo

Java decompiler GUI tool for Procyon under Apache License.

0
The Absurdly Underestimated Dangers of CSV Injection Logo

A blog post discussing the often overlooked dangers of CSV injection in applications.

0
Kansa Logo

A modular incident response framework in Powershell that uses Powershell Remoting to collect data for incident response and breach hunts.

0
Wfuzz Logo

Wfuzz is a tool designed for bruteforcing Web Applications with multiple features like multiple injection points, recursion, and payload combinations.

0
rpCheckup Logo

rpCheckup is an AWS resource policy security analysis tool that identifies public, external, intra-organizational, and private resource access patterns across AWS accounts.

0
AWS Secrets Manager Logo

A fully managed service that securely stores, rotates, and manages sensitive data such as database credentials and API keys.

0
pghoney Logo

A simple Postgres honey pot inspired by Elastichoney.

0
CTF_WRITEUPS Logo

CTF Writeups are detailed educational documents that explain the step-by-step solutions to Capture The Flag cybersecurity challenges, serving as learning resources for security professionals.

0