The Largest Platform to Find Cybersecurity Tools

Browse 8,845 the largest platform to find cybersecurity tools tools

RECENTLY ADDED

Azure Guardrails Logo

A tool that generates Terraform files for creating Azure Policy Initiatives to implement cloud security guardrails and enforce organizational standards at scale.

0
YouTube Logo

A video-sharing platform for creators to share their content and for users to discover new content, with a focus on cybersecurity.

0
CTF Write-ups Repository (2016) Logo

A collaborative repository containing CTF competition write-ups and source files from 2016, providing accessible solutions and educational resources for cybersecurity challenges.

0
PSHunt Logo

Powershell Threat Hunting Module for scanning remote endpoints and collecting comprehensive information.

0
w3af Logo

w3af is an open source web application security scanner that identifies over 200 types of vulnerabilities including XSS, SQL injection, and OS commanding in web applications.

0
protobuf-inspector Logo

A command-line tool that parses Google Protobuf encoded data without schema definitions and displays the content in a readable, colored format.

0
Understanding Docker container escapes Logo

Exploit that launches a process on the host from within a Docker container run with the --privileged flag by abusing the Linux cgroup v1 “notification on release” feature.

0
Unfetter Logo

Unfetter is a reference implementation framework that collects events from client machines and performs CAR analytics using an ELK stack with Apache Spark to detect potential adversary activity.

0
libimobiledevice Logo

A cross-platform software library for interacting with iOS devices without jailbreaking.

0
Penguin OS Forensic (or Flight) Recorder (POFR) Logo

POFR is a Linux forensic data collection system that captures process execution, file access, and network activity for incident response and compliance analysis.

0
Active Directory Control Paths Logo

A tool for analyzing and visualizing control relationships and privilege escalation paths within Active Directory environments using graph-based representations.

0
JARM Logo

JARM is a TLS server fingerprinting tool used for identifying server configurations and malicious infrastructure.

0
Frida Logo

Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.

0
McAfee Blogs Logo

Explore cybersecurity insights and tips on McAfee Blogs to stay safe online.

0
ASecureCloud Logo

AI-Powered Cloud Assistant for building, securing, and operating cloud environments.

0
enum4linux-ng Logo

A next generation version of enum4linux with enhanced features for enumerating information from Windows and Samba systems.

0
GRFICSv2 Logo

A Graphical Realism Framework for Industrial Control Simulation organized as 5 VirtualBox VMs for realistic ICS network simulation.

0
DumpItForLinux Logo

A tool for creating compact Linux memory dumps compatible with popular debugging tools.

0
CakeFuzzer Logo

CakeFuzzer is an automated vulnerability discovery tool specifically designed for identifying security issues in CakePHP web applications with minimal false positives.

0
Zenduty Logo

Zenduty's platform provides real-time operational health monitoring and incident response orchestration to improve incident response times and build a solid on-call culture.

0
Pupy Logo

Pupy is an open-source, cross-platform C2 framework that provides remote access and control capabilities for compromised systems across Windows, Linux, OSX, and Android platforms.

0
Windows 10/11 Hardening Script Logo

Enhances Windows OS security through system modifications and settings adjustments.

0
Tor Exit Addresses Logo

A database of Tor exit nodes with their corresponding IP addresses and timestamps.

0
HoneyWRT Intrusion Detection System Logo

A low interaction Python honeypot designed to mimic various services and ports to attract attackers and log access attempts.

0