The Largest Platform to Find Cybersecurity Tools

Browse 8,845 the largest platform to find cybersecurity tools tools

RECENTLY ADDED

mailspoof Logo

A command-line tool that analyzes SPF and DMARC records to identify domains vulnerable to email spoofing attacks.

0
WSSiP Logo

A WebSocket Manipulation Proxy with a user interface to capture, intercept, and send custom messages for WebSocket and Socket.IO communications.

0
fexecve harness Logo

A collection of tools that execute programs directly in memory using various delivery methods including URL downloads and netcat connections.

0
bulk_extractor Logo

A high-performance digital forensics exploitation tool for extracting structured information from various inputs without parsing file system structures.

0
Impost Logo

Impost is a powerful network security auditing tool with honey pot and packet sniffer capabilities.

0
Kubernetes Network Policy Recipes Logo

A repository of Kubernetes Network Policy examples and YAML configurations for controlling network traffic and implementing security controls in Kubernetes clusters.

0
Drifter Logo

A wargame that challenges your hacking skills

0
Santa Logo

Santa is a macOS binary and file access authorization system that monitors executions and makes allow/block decisions based on local database rules.

0
SecMobi Wiki Logo

A collection of mobile security resources with tools, white papers, ebooks, and webinars.

0
npq Logo

A tool that safely installs packages with npm/yarn by auditing them as part of your install process.

0
Node.js Bug Bounty Program Logo

A HackerOne-managed bug bounty program dedicated to identifying and fixing security vulnerabilities in the Node.js ecosystem.

0
Clinv Logo

Clinv is a command line DevSecOps asset inventory tool for tracking and managing digital assets across organizational infrastructure.

0
Security Trainings Logo

Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.

0
AndroL4b Logo

Android security virtual machine with updated tools and frameworks for reverse engineering and malware analysis.

0
steg86 Logo

steg86 is a steganographic tool that hides information within x86 and AMD64 binary executables without affecting their performance or file size.

0
malscan Logo

Malscan is a tool to scan process memory for YARA matches and execute Python scripts.

0
sdc-check Logo

A dependency security analysis tool that identifies potential risks in project dependencies including unsafe lock files, installation scripts, obfuscated code, and dangerous shell commands.

0
Forseti Security Logo

An archived community-driven collection of open source cloud security tools that provided monitoring and compliance capabilities for cloud infrastructure.

0
mkYARA Logo

Automate the process of writing YARA rules based on executable code within malware.

0
CVE Logo

The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.

0
ThreatHunting Project Logo

A community-driven informational repository providing resources and guidance for hunting adversaries in IT environments.

0
Koadic Logo

A COM Command & Control framework that uses JScript to provide fileless remote access capabilities on Windows systems through a modular plugin architecture.

0
Android Vulnerability Test Suite Logo

A tool that showcases the attack surface of a given Android device, highlighting potential vulnerabilities and security risks.

0
Commix-Testbed Logo

A collection of vulnerable web applications containing command injection flaws designed to test and evaluate detection and exploitation tools like commix.

0