Explore 2989 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
Want your tool featured here?
Get maximum visibility with pinned placement
The Web's Largest Community Tracking Online Fraud & Abuse
A honeypot that emulates a Belkin N300 Home Wireless router with default setup to observe traffic
A honeypot that emulates a Belkin N300 Home Wireless router with default setup to observe traffic
A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.
Comprehensive guide on best practices for PHP development.
A weekly newsletter covering computer security news and tutorials
A tool that collects and displays user activity and system events on a Windows system.
A tool that collects and displays user activity and system events on a Windows system.
Automate actions on Security Command Center findings with automated disk snapshots, IAM grant revocation, and more.
Automate actions on Security Command Center findings with automated disk snapshots, IAM grant revocation, and more.
DOM-based XSS vulnerability scanner
Express middleware for detecting and redirecting Tor or Surface users.
Express middleware for detecting and redirecting Tor or Surface users.
A Python script that lists all main resources of your AWS account, helping you find resources that affect billing and/or security.
A Python script that lists all main resources of your AWS account, helping you find resources that affect billing and/or security.
A daily updated list of the top 1 million websites in the world, ordered by referring subnets.
A daily updated list of the top 1 million websites in the world, ordered by referring subnets.
HxD is a freeware hex editor and disk editor with advanced features for editing files, memory, and disks.
HxD is a freeware hex editor and disk editor with advanced features for editing files, memory, and disks.
A tool that scans a corpus of malware and builds a YARA rule to detect similar code sections.
A tool that scans a corpus of malware and builds a YARA rule to detect similar code sections.
A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files or live network traffic.
A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files or live network traffic.
Toolkit for secure destruction of sensitive data with customizable overwrite methods.
Toolkit for secure destruction of sensitive data with customizable overwrite methods.
A Python library for loading and executing Beacon Object Files (BOFs) in-memory.
A Python library for loading and executing Beacon Object Files (BOFs) in-memory.
Security Affairs provides comprehensive insights into global cybersecurity threats and protective measures.
Security Affairs provides comprehensive insights into global cybersecurity threats and protective measures.
A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.
A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.
A tool that generates least privilege IAM policies for AWS services
A tool that generates least privilege IAM policies for AWS services
A tool for analyzing Android applications in local storage with various functionalities.
A tool for analyzing Android applications in local storage with various functionalities.
Repository with projects for photo and video hashing, content moderation, and signal exchange.
Repository with projects for photo and video hashing, content moderation, and signal exchange.
A collection of Yara rules for detecting malware evasion techniques
A collection of Yara rules for detecting malware evasion techniques