The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

headi Logo

A tool for automated HTTP header injection

0
awesome-vulnerable-apps Logo

A list of vulnerable applications for testing and learning

0
gowitness Logo

A Go-based command-line tool that uses Chrome Headless to automatically capture screenshots of web pages for reconnaissance and analysis purposes.

0
Trufflehog-Chrome-Extension Logo

A Chrome browser extension that uses machine learning to detect and alert users about sensitive data exposure and potential data breaches across web environments.

0
SSRFmap Logo

Automatic SSRF fuzzer and exploitation tool

0
LinkFinder Logo

A Python script that finds endpoints in JavaScript files to identify potential security vulnerabilities.

0
Razzer Logo

A Kernel fuzzer focusing on race bugs

0
sentrySSRF Logo

A tool to search for Sentry config on a page or in JavaScript files and check for blind SSRF

0
Param Miner Logo

A command-line tool that identifies and extracts parameters from HTTP requests and responses to assist with web application security testing and vulnerability assessment.

0
xssValidator Logo

A Burp Suite extension that automates XSS vulnerability detection and validation through custom payload generation and response analysis.

0
Git-Vuln-Finder Logo

A tool that uses NLP and ML to identify potential software vulnerabilities from git commit messages

0
CORStest Logo

A security scanner that identifies Cross-Origin Resource Sharing (CORS) misconfigurations in web applications to detect potential vulnerabilities.

0
autoSubTakeover Logo

A tool to identify potential subdomain takeovers by checking if a CNAME record resolves to the scope address.

0
Naabu Logo

A fast and reliable port scanner written in Go, designed for attack surface discovery in bug bounties and penetration testing.

0
CloudScraper Logo

CloudScraper is an enumeration tool that discovers cloud storage resources including S3 buckets, Azure blobs, and DigitalOcean Spaces across target environments.

0
xsshunter_client Logo

A correlated injection proxy tool that integrates with XSS Hunter for automated cross-site scripting vulnerability testing and payload tracking.

0
Oralyzer Logo

A security analysis tool that detects and analyzes open redirection vulnerabilities in web applications.

0
bugcrowd-levelup-subdomain-enumeration Logo

Educational repository containing materials on advanced subdomain enumeration techniques from Bugcrowd LevelUp 2017 conference.

0
s3reverse Logo

A format conversion tool for S3 buckets designed to assist bug bounty hunters and security testers in standardizing bucket data during reconnaissance activities.

0
Depix Logo

A tool that recovers passwords from pixelized screenshots

0
NoSql Injection CLI tool Logo

A command-line tool for identifying NoSQL injection vulnerabilities in MongoDB databases through automated scanning and reporting.

0
aemscan Logo

A tool for scanning Adobe Experience Manager instances for potential security vulnerabilities

0
s3_objects_check Logo

A security tool that performs whitebox evaluation of S3 object permissions to identify publicly accessible files and generate reports on potential exposure risks.

0
extended-xss-search Logo

A better version of my xssfinder tool that scans for different types of XSS on a list of URLs.

0