Loading...
Browse 8,845 the largest platform to find cybersecurity tools tools
A container compliance and vulnerability assessment tool that uses OpenSCAP to scan Docker images and running containers for security vulnerabilities and compliance violations.
A container compliance and vulnerability assessment tool that uses OpenSCAP to scan Docker images and running containers for security vulnerabilities and compliance violations.
Exhaustive checklist for securing Node.js web services with a focus on error handling and custom error pages.
Exhaustive checklist for securing Node.js web services with a focus on error handling and custom error pages.
Open-source initiative providing malicious and benign datasets to expedite data analysis and threat research.
Open-source initiative providing malicious and benign datasets to expedite data analysis and threat research.
Metta is an information security preparedness tool for adversarial simulation.
Metta is an information security preparedness tool for adversarial simulation.
CustomProcessor is a policy management tool that enables users to create and manage custom policies for IETF policy frameworks through a user-friendly interface.
CustomProcessor is a policy management tool that enables users to create and manage custom policies for IETF policy frameworks through a user-friendly interface.
CredMaster enhances password spraying tactics with IP rotation to maintain anonymity and efficiency.
CredMaster enhances password spraying tactics with IP rotation to maintain anonymity and efficiency.
An anti-forensic Linux Kernel Module kill-switch for USB ports.
An anti-forensic Linux Kernel Module kill-switch for USB ports.
A collection of Android Applications with malware analysis results
Open Backup Extractor is an open source program for extracting data from iPhone and iPad backups.
Open Backup Extractor is an open source program for extracting data from iPhone and iPad backups.
A detailed manual for cybersecurity professionals focusing on red team, OSINT, and blue team strategies.
A detailed manual for cybersecurity professionals focusing on red team, OSINT, and blue team strategies.
A macOS Initial Access Payload Generator for penetration testing and red teaming exercises.
A macOS Initial Access Payload Generator for penetration testing and red teaming exercises.
Certbot is a free tool for automatically enabling HTTPS on websites using Let's Encrypt certificates.
Certbot is a free tool for automatically enabling HTTPS on websites using Let's Encrypt certificates.
A webshell manager via terminal for controlling web servers running PHP or MySQL.
A webshell manager via terminal for controlling web servers running PHP or MySQL.
Tcpreplay is a network traffic editing and replay tool used for testing network devices and applications.
Tcpreplay is a network traffic editing and replay tool used for testing network devices and applications.
ZAT is a Python package that processes and analyzes Zeek network security data using machine learning libraries like Pandas, scikit-learn, Kafka, and Spark.
ZAT is a Python package that processes and analyzes Zeek network security data using machine learning libraries like Pandas, scikit-learn, Kafka, and Spark.
Collects Yara rules from over 150 free resources, a free alternative to Valhalla.
Collects Yara rules from over 150 free resources, a free alternative to Valhalla.
A presentation about the OWASP Top 10, a list of the most critical security risks to web applications.
A presentation about the OWASP Top 10, a list of the most critical security risks to web applications.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
A powerful tool for searching and scraping data from GitHub
A Burp Suite plugin that extracts keywords from HTTP responses using regex patterns and tests for reflected XSS vulnerabilities within the target scope.
A Burp Suite plugin that extracts keywords from HTTP responses using regex patterns and tests for reflected XSS vulnerabilities within the target scope.
A repository of CTF challenges and resources from various cybersecurity competitions.
A repository of CTF challenges and resources from various cybersecurity competitions.
Intentionally vulnerable Kubernetes cluster environment for learning and practicing Kubernetes security.
Intentionally vulnerable Kubernetes cluster environment for learning and practicing Kubernetes security.
Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.
Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.
Get strategic cybersecurity insights in your inbox
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance