Explore 2989 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
Want your tool featured here?
Get maximum visibility with pinned placement
An open-source security tool for AWS, Azure, Google Cloud, and Kubernetes security assessments and audits.
A tool for enumerating and attacking GitHub Actions pipelines
A fuzzer for detecting open redirect vulnerabilities
PCMag's Security Watch offers timely insights and reviews on security software and technologies.
PCMag's Security Watch offers timely insights and reviews on security software and technologies.
StaCoAn is a cross-platform tool for static code analysis on mobile applications, emphasizing the identification of security vulnerabilities.
StaCoAn is a cross-platform tool for static code analysis on mobile applications, emphasizing the identification of security vulnerabilities.
Collection of cybersecurity conference videos recorded by Cooper (@Ministraitor)
Collection of cybersecurity conference videos recorded by Cooper (@Ministraitor)
An open-source, drag-and-drop security workflow builder with integrated case management for automating security workflows and tackling alert fatigue.
An open-source, drag-and-drop security workflow builder with integrated case management for automating security workflows and tackling alert fatigue.
Track postMessage usage with this Chrome Extension
YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.
YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.
YLS Language Server for YARA Language with comprehensive features and Python 3.8 support.
YLS Language Server for YARA Language with comprehensive features and Python 3.8 support.
An open source framework for security assessments of iOS apps, now decommissioned in favor of Objection.
An open source framework for security assessments of iOS apps, now decommissioned in favor of Objection.
A comprehensive collection of security assessment lists for security testers.
A comprehensive collection of security assessment lists for security testers.
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
Acapulco is a Splunk application that automatically generates meta-events from hpfeeds channels and visualizes them using D3.js.
Acapulco is a Splunk application that automatically generates meta-events from hpfeeds channels and visualizes them using D3.js.
A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.
Database protection suite with field-level encryption and intrusion detection
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
Open-source Java application for creating proxies for traffic analysis & modification.
Open-source Java application for creating proxies for traffic analysis & modification.
Identify AWS IAM permissions by brute-forcing API calls.
Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.
Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.
One of the oldest hacker conventions in America, offering a unique and personal experience.
One of the oldest hacker conventions in America, offering a unique and personal experience.
Orochi is a collaborative forensic memory dump analysis framework.
Online cybersecurity conference with speakers' talks and interactive Q&A sessions.
Online cybersecurity conference with speakers' talks and interactive Q&A sessions.