The Largest Platform to Find Cybersecurity Tools

Browse 8,845 the largest platform to find cybersecurity tools tools

RECENTLY ADDED

Maldrolyzer Logo

A simple framework for extracting actionable data from Android malware

0
@fastify/rate-limit Logo

A low overhead rate limiter for your routes

0
Galah Logo

Galah is an LLM-powered web honeypot that mimics various web applications by dynamically responding to HTTP requests.

0
panic_bcast Logo

A decentralized network panic button that triggers emergency system shutdowns across networked machines via UDP broadcasts and HTTP to prevent cold boot attacks.

0
AWS Audit Manager Logo

Continually audit your AWS usage to simplify risk and compliance assessment.

0
MimiPenguin 2.0 Logo

A tool to dump login passwords from Linux desktop users, leveraging cleartext credentials in memory.

0
Docker Layer 2 ICC Bug Logo

A Docker security vulnerability where disabling inter-container communication (ICC) fails to block raw ethernet frames, allowing unexpected data transfer between containers via raw sockets.

0
GtkSourceView-YARA Logo

YARA syntax highlighting for Gtk-based text editors

0
MFT_Browser Logo

Recreates the File/Directory tree structure from an extracted $MFT file with detailed record mapping and analysis capabilities.

0
Linux Containers in 500 Lines of Code Logo

A project exploring minimal set of restrictions for running untrusted code using Linux containers in a concise codebase.

0
NightShade Logo

NightShade is a Django-based capture the flag framework that enables organizations to create and manage cybersecurity competitions with support for multiple contest formats and multi-tenant architecture.

0
Nuvola Logo

A cloud security analysis tool that creates digital twins of AWS environments using graph databases to identify attack paths and security misconfigurations through automated and manual rule-based assessments.

0
CloudFox Logo

CloudFox is an open source command line tool that helps penetration testers and offensive security professionals identify exploitable attack paths and gain situational awareness in cloud infrastructure environments.

0
StegCloak Logo

A JavaScript steganography module that hides encrypted secrets within text using invisible Unicode characters for covert communication across web platforms.

0
eScan Endpoint Security Logo

Comprehensive endpoint security solution for enterprise networks and SMBs

0
FullHunt Logo

FullHunt is a next-generation attack surface security platform that enables companies to discover, monitor, and secure their external attack surfaces.

0
Android port of Radamsa Logo

An Android port of the Radamsa fuzzing tool compiled with Android NDK to support Android ABIs for security testing on mobile platforms.

0
Wifislax Logo

GNU/Linux Wireless distribution for security testing with XFCE desktop environment.

0
The Matasano Crypto Challenges Logo

A set of 48 practical programming exercises in cryptography and application security

0
Infosec Resources Logo

Infosec Resources provides extensive cybersecurity training and certifications to boost cybersecurity skills and careers.

0
HoneyDB Logo

HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

0
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus Logo

A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.

0
RiskInDroid Logo

RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.

0
GCPBucketBrute Logo

A script to enumerate Google Storage buckets and determine access and privilege escalation

0