The Largest Platform to Find Cybersecurity Tools

Browse 8,845 the largest platform to find cybersecurity tools tools

RECENTLY ADDED

StegSolve Logo

StegSolve is a steganography analysis tool with image analysis features.

0
hashlookup-forensic-analyser Logo

Analyse a forensic target to find and report files found and not found in hashlookup CIRCL public service.

0
liblnk Logo

A library to access and parse Windows Shortcut File (LNK) format.

0
InvisibilityCloak Logo

InvisibilityCloak is a proof-of-concept C# code obfuscation toolkit designed for red teaming and penetration testing to conceal post-exploitation tools from detection.

0
AWS Certificate Manager Logo

Provision, manage, and renew SSL/TLS certificates for your AWS resources with AWS Certificate Manager.

0
Gitjacker Logo

A tool to leak git repositories from misconfigured websites

0
Binary Edge Logo

A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.

0
Modern Binary Exploitation - CSCI 4968 Logo

Educational repository containing RPISEC's course materials for teaching modern binary exploitation, vulnerability research, and reverse engineering at Rensselaer Polytechnic Institute.

0
Windows Oneliners for Remote Code Execution Logo

Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.

0
Darkarmour Logo

Darkarmour is an open-source Windows antivirus evasion framework that enables security professionals to bypass antivirus detection through customizable obfuscation and anti-analysis techniques.

0
libmsiecf Logo

A library for accessing and parsing Microsoft Internet Explorer cache files (index.dat) to extract URLs, timestamps, and cached content for digital forensic analysis.

0
Monkey-Spider Logo

A crawler-based low-interaction client honeypot for exposing website threats.

0
nTimetools Logo

A suite of console tools for working with timestamps in Windows with 100-nanosecond precision.

0
Hack.lu 2019 Conference Logo

Cybersecurity conference with talks on privacy, security monitoring, ransomware, and more.

0
Nuxt Security Logo

A Nuxt 3 security module that automatically implements OWASP security patterns through HTTP headers, middleware, and various protection mechanisms including CSP, XSS validation, CORS, and CSRF protection.

0
Sticky Elephant Logo

A medium-interaction PostgreSQL honeypot with configurable settings

0
CyberCPR Logo

Incident response and case management solution for efficient incident response and management.

0
OWASP OWTF Logo

OWASP OWTF is a penetration testing framework focused on efficiency and alignment with security standards.

0
Yobi Logo

Yara Based Detection for web browsers

0
NMAP Logo

Nmap is an essential network scanning tool used for network security auditing and status monitoring.

0
PF_RING Logo

High-speed packet capture library with user-level network socket.

0
Telekom Security Malware Analysis Repository Logo

Repository of scripts, signatures, and IOCs related to various malware analysis topics.

0
OWASP ServerlessGoat Logo

A serverless application that demonstrates common serverless security flaws and weaknesses

0
dc3dd Logo

dc3dd is a patch to the GNU dd program, tailored for forensic acquisition with features like hashing and file verification.

0