The Largest Platform to Find Cybersecurity Tools

Browse 8,845 the largest platform to find cybersecurity tools tools

RECENTLY ADDED

0xf.at Hackits Logo

Solve password-riddles on a website without logins or ads.

0
Subra Logo

A simple web-based interface for subdomain enumeration using the subfinder tool.

0
NoSQL-Honeypot-Framework (NoPo) Logo

An open source honeypot for NoSQL databases with support for Redis and additional features for detecting attackers and logging attack incidents.

0
Enterprise Detection & Response: A Simple Hunting Maturity Model Logo

A simple maturity model for enterprise detection and response

0
SharpShares Logo

SharpShares efficiently enumerates and maps network shares and resolves names within a domain.

0
Volexity Threat Intelligence Repository Logo

Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.

0
Boomerang Decompiler Logo

An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.

0
Maltrail Logo

Maltrail is a malicious traffic detection system utilizing blacklists and heuristic mechanisms.

0
Reverse Engineering for Beginners Logo

A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.

0
FLARE-VM Logo

FLARE-VM is a Windows virtual machine setup tool that automates the installation and configuration of reverse engineering and malware analysis software using Chocolatey and Boxstarter technologies.

0
YARA-Signator Logo

Automatic YARA rule generation for malware repositories.

0
App Detonator Logo

A tool for dynamic analysis of mobile applications in a controlled environment.

0
PINCE Logo

PINCE is a front-end/reverse engineering tool for the GNU Project Debugger (GDB), focused on games, with CheatEngine-like value type support and memory searching capabilities.

0
iam-lint Logo

A GitHub action that lints AWS IAM policy documents to identify security issues and misconfigurations with configurable severity levels and custom rules.

0
YaYaGen Logo

Automatic YARA rule generator based on Koodous reports with limited false positives.

0
SOARCA Logo

SOARCA is an open-source SOAR platform that automates security incident response workflows using standardized CACAOv2 playbooks and multiple integration interfaces.

0
Papa Shango Logo

A Linux process injection tool that uses ptrace() to inject assembly-based shellcode into running processes without NULL byte restrictions.

0
DataPlane.org Logo

Dataplane.org is a nonprofit organization providing free data, tools, and analysis to increase awareness of Internet trends, anomalies, threats, and misconfigurations.

0
FeatherDuster (and Cryptanalib) Logo

FeatherDuster is a cryptanalysis tool that automatically identifies and exploits weaknesses in cryptographic systems by analyzing ciphertext files.

0
YAIDS Logo

A multi-threaded intrusion detection system using Yara for network and stream IDS

0
Payloads All The Things Logo

A comprehensive repository of payloads and bypass techniques for web application security testing and penetration testing across multiple platforms and attack vectors.

0
Magic Rescue Logo

A tool for recovering files by scanning block devices and extracting them based on 'magic bytes' in file contents.

0
xmlstarlet Logo

XMLStarlet offers a suite of command line utilities for manipulating and querying XML documents.

0
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite Logo

Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

0