The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

ThreatCheck Logo

A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.

0
mXtract Logo

mXtract is a Linux-based tool for memory analysis and dumping with regex pattern search capabilities.

0
TrailScraper Logo

TrailScraper is a command-line tool for extracting information from AWS CloudTrail logs and generating IAM policies based on actual API usage patterns.

0
GadgetToJScript Logo

A tool that generates .NET serialized gadgets for triggering assembly load and execution through BinaryFormatter deserialization in JavaScript, VBScript, and VBA scripts.

0
Detecting the Elusive - Active Directory Threat Hunting Logo

A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.

0
Dorothy Logo

Dorothy is a tool to test monitoring and detection capabilities for Okta environments, with modules mapped to MITRE ATT&CK® tactics.

0
VMCloak Logo

VMCloak is a tool for creating and preparing Virtual Machines for Cuckoo Sandbox.

0
Yar Logo

Yar is a reconnaissance tool for scanning organizations, users, and repositories to identify vulnerabilities and security risks during security assessments.

0
EarlyBird Logo

A sensitive data detection tool for scanning source code repositories

0
yara_rules Logo

A collection of YARA rules for Windows, Linux, and Other threats.

0
Apple Silicon Mac Security Guide Logo

Enhance the security and privacy of Apple silicon Mac computers with incremental changes and user capability.

0
ANY.RUN Logo

Interactive malware hunting service with live access to the heart of an incident.

1
FastIR Collector Logo

Tool for live forensics acquisition on Windows systems, collecting artefacts for early compromise detection.

0
InternalBlue Logo

InternalBlue is a Bluetooth experimentation framework that enables low-level firmware interaction with Broadcom chips for security research and attack prototype development.

0
S3Scanner Logo

S3Scanner is an open-source tool that scans S3 buckets across S3-compatible APIs to identify misconfigurations and security vulnerabilities.

0
Microsoft Security Blog Logo

A cybersecurity blog from Microsoft, featuring articles and guides on various security topics, including AI, threat intelligence, cloud security, and incident response.

0
Varna Logo

Varna is an AWS serverless security tool that monitors CloudTrail logs using Event Query Language to detect and alert on suspicious activities in cloud environments.

0
Krampus Logo

Krampus is an AWS resource management tool that automates the deletion and disabling of cloud objects based on JSON task files for security remediation and cost control.

0
C3 Logo

C3 is a framework by WithSecureLabs for rapid prototyping of custom command and control channels that integrates with existing offensive security toolkits.

0
Manuka by SpaceRaccoon Logo

An open-source OSINT honeypot that monitors threat actor reconnaissance attempts and generates early-warning intelligence for blue teams during the pre-attack phase.

0
BinaryMist Logo

A company that helps organizations create security-aware teams and produce bug-free software.

0
Dorothy2 Logo

A malware/botnet analysis framework with a focus on network analysis and process comparison.

0
netsniff-ng toolkit Logo

netsniff-ng is a free Linux networking toolkit with zero-copy mechanisms for network development, analysis, and auditing.

0
suicideCrypt Logo

A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.

0