Explore 2989 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
Want your tool featured here?
Get maximum visibility with pinned placement
A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.
A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.
Python framework for building and utilizing interfaces to transfer data between frameworks with a focus on Command and Control frameworks.
Python framework for building and utilizing interfaces to transfer data between frameworks with a focus on Command and Control frameworks.
Endlessh is an SSH tarpit that traps SSH clients by sending an endless, random SSH banner.
Endlessh is an SSH tarpit that traps SSH clients by sending an endless, random SSH banner.
MetaDefender Cloud offers advanced threat prevention using technologies like Multiscanning, Deep CDR, and Sandbox.
MetaDefender Cloud offers advanced threat prevention using technologies like Multiscanning, Deep CDR, and Sandbox.
A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.
A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.
PCAPdroid is a privacy-friendly app for tracking, analyzing, and blocking network connections on your device.
PCAPdroid is a privacy-friendly app for tracking, analyzing, and blocking network connections on your device.
A repository aiming to archive all Android security presentations and whitepapers from conferences.
A repository aiming to archive all Android security presentations and whitepapers from conferences.
A comprehensive open dictionary of fault injection patterns and predictable resource locations for dynamic application security testing
A comprehensive open dictionary of fault injection patterns and predictable resource locations for dynamic application security testing
A repository to aid Windows threat hunters in looking for common artifacts.
A repository to aid Windows threat hunters in looking for common artifacts.
Steghide is a steganography program for hiding data in image and audio files.
Steghide is a steganography program for hiding data in image and audio files.
angr is a Python 3 library for binary analysis with various capabilities like symbolic execution and decompilation.
angr is a Python 3 library for binary analysis with various capabilities like symbolic execution and decompilation.
Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.
Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.
A free book providing design and implementation guidelines for writing secure programs in various languages.
A free book providing design and implementation guidelines for writing secure programs in various languages.
A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
A list of most queried domains based on passive DNS usage across the Umbrella global network.
A list of most queried domains based on passive DNS usage across the Umbrella global network.
A StalkPhish Project YARA repository for Phishing Kits zip files.
A StalkPhish Project YARA repository for Phishing Kits zip files.
Automatic authorization enforcement detection extension for Burp Suite
Automatic authorization enforcement detection extension for Burp Suite
A post-exploitation framework for attacking running AWS infrastructure
Generates shellcode that loads Windows payloads from memory and runs them with parameters.
Generates shellcode that loads Windows payloads from memory and runs them with parameters.
A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel
A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel
A deep dive into the Ledger connect-kit compromise decryption process.
A deep dive into the Ledger connect-kit compromise decryption process.
A Yara ruleset for detecting PHP shells and other webserver malware.
Powerful debugging tool with extensive features and extensions for memory dump analysis and crash dump analysis.
Powerful debugging tool with extensive features and extensions for memory dump analysis and crash dump analysis.
QIRA is a competitor to strace and gdb with MIT license, supporting Ubuntu and Docker for wider compatibility.
QIRA is a competitor to strace and gdb with MIT license, supporting Ubuntu and Docker for wider compatibility.