Explore 2989 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
Want your tool featured here?
Get maximum visibility with pinned placement
Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.
Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
A simple command-line tool that scans a website for CORS misconfigurations
A simple command-line tool that scans a website for CORS misconfigurations
App-Ray offers comprehensive security analysis and compliance solutions for mobile applications.
App-Ray offers comprehensive security analysis and compliance solutions for mobile applications.
Hackazon is a free, vulnerable test site with an online storefront to train and test IT security professionals on various vulnerabilities like SQL Injection and cross-site scripting.
Hackazon is a free, vulnerable test site with an online storefront to train and test IT security professionals on various vulnerabilities like SQL Injection and cross-site scripting.
A honeypot designed to detect and analyze malicious activities in instant messaging platforms.
A honeypot designed to detect and analyze malicious activities in instant messaging platforms.
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.
A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.
MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.
MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.
A curated list of resources for learning about deploying, managing, and hunting with Microsoft Sysmon.
A curated list of resources for learning about deploying, managing, and hunting with Microsoft Sysmon.
A tool for extracting static and dynamic features from Android APKs.
A tool for extracting static and dynamic features from Android APKs.
Automate security incident handling and facilitate real-time activities of incident handlers.
Automate security incident handling and facilitate real-time activities of incident handlers.
Sysreptor offers a customizable reporting solution for penetration testing and red teaming.
Sysreptor offers a customizable reporting solution for penetration testing and red teaming.
A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.
A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.
SentinelOne's Singularity Platform is an AI-powered enterprise security platform providing autonomous endpoint, cloud, identity, and data protection through its integrated XDR solution.
SentinelOne's Singularity Platform is an AI-powered enterprise security platform providing autonomous endpoint, cloud, identity, and data protection through its integrated XDR solution.
A comprehensive guide for using Docker with detailed information on prerequisites, installation, containers, images, networks, and more.
A comprehensive guide for using Docker with detailed information on prerequisites, installation, containers, images, networks, and more.
Coursera offers free online learning resources and courses during the COVID-19 pandemic.
Coursera offers free online learning resources and courses during the COVID-19 pandemic.
A repository of open-source plugins for Rapid7 InsightConnect
A repository of open-source plugins for Rapid7 InsightConnect
A tool for identifying and analyzing Java serialized objects in network traffic
A tool for identifying and analyzing Java serialized objects in network traffic
A framework for building code injection vulnerability testbeds
A software reverse engineering framework with full-featured analysis tools and support for multiple platforms, instruction sets, and executable formats.
A software reverse engineering framework with full-featured analysis tools and support for multiple platforms, instruction sets, and executable formats.
Turbinia is an open-source framework for automating the running of common forensic processing tools to help with processing evidence in the Cloud.
Turbinia is an open-source framework for automating the running of common forensic processing tools to help with processing evidence in the Cloud.
A tool for performing hash length extension attacks against multiple hashing algorithms.
A tool for performing hash length extension attacks against multiple hashing algorithms.
Clevis is a pluggable framework for automated decryption.