The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

tcpreplay Logo

Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.

0
IMAP-Honey Logo

IMAP-Honey is a honeypot tool for IMAP and SMTP protocols with support for logging to console or syslog.

0
Google Play Unofficial Python API Logo

An unofficial Python API that enables programmatic searching, browsing, and downloading of Android apps from Google Play Store.

0
Cloudmersive Virus Scan Logo

Cloud-based virus scan APIs for securing files, URLs, and content uploads with advanced anti-virus and malware scanning capabilities.

0
Wigle Logo

WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.

0
Golismero Logo

A free and open-source OSINT framework for gathering and analyzing data from various sources

0
Tang Logo

Tang is a network-based server that binds encrypted data access to network presence, allowing data decryption only when clients are connected to the specific network where the Tang server operates.

0
Pentest Lab Logo

Local pentest lab using docker compose to spin up victim and attacker services.

2
MFTExtractor Logo

A tool for parsing and extracting information from the Master File Table of NTFS file systems.

0
ROP Wargame Repository Logo

A collection of Return-Oriented Programming (ROP) challenges designed for practicing binary exploitation techniques and developing offensive security skills.

0
HoneyView Logo

HoneyView is a tool for analyzing honeyd logfiles graphically and textually.

0
Conmachi Container Scanner Logo

A Golang-based container security scanner that identifies potential vulnerabilities and misconfigurations in container environments by checking namespacing, capabilities, security profiles, and host device mounts.

0
OVAA (Oversecured Vulnerable Android App) Logo

OVAA is an intentionally vulnerable Android application that aggregates common platform security vulnerabilities for educational and security testing purposes.

0
Aaia Logo

Aaia visualizes AWS IAM and Organizations data in Neo4j graph format to help identify security outliers and conduct privilege escalation analysis through Cypher queries.

0
GRR Rapid Response Logo

Incident response framework focused on remote live forensics

0
HIHAT - High Interaction Honeypot Analysis Toolkit Logo

A toolkit that transforms PHP applications into web-based high-interaction Honeypots for monitoring and analyzing attacks.

0
Deep Instinct for Endpoints Logo

Deep Instinct is a predictive prevention platform that uses deep learning to prevent unknown threats, including ransomware and zero-day malware, from infiltrating storage environments, applications, and endpoints.

0
Shuffle Logo

Shuffle is a platform for automating security workflows with confidence, offering templates, collaboration tools, and a large app library.

0
HoneyPress Logo

WordPress honeypot tool running in a Docker container for monitoring access attempts.

0
SigThief Logo

SigThief extracts digital signatures from signed PE files and appends them to other files to create invalid signatures for testing Anti-Virus detection mechanisms.

0
Android Malware Genome Project Logo

A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.

0
Audit Node Modules With YARA Rules Logo

A tool to run YARA rules against node_module folders to identify suspicious scripts

0
Spectra Logo

Comprehensive suite for advanced file analysis and software supply chain security.

0
Cloud Sniper Logo

Cloud Sniper is a centralized cloud security operations platform that provides incident response, threat correlation, and automated security actions for cloud infrastructure protection.

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavantAI Logo

Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.

5
OSINTLeak Logo

OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

5
Mandos Brief Cybersecurity Newsletter Logo

Weekly cybersecurity newsletter for security leaders and professionals

5
View Popular Tools →