The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

Honeytrap by Till Mannw Logo

Honeytrap is a low-interaction honeypot and network security tool with various modes of operation and plugin support for catching attacks against TCP and UDP services.

0
oscap-docker Logo

A container compliance and vulnerability assessment tool that uses OpenSCAP to scan Docker images and running containers for security vulnerabilities and compliance violations.

0
Strong Node.js Logo

Exhaustive checklist for securing Node.js web services with a focus on error handling and custom error pages.

0
Security Datasets Logo

Open-source initiative providing malicious and benign datasets to expedite data analysis and threat research.

0
Metta Logo

Metta is an information security preparedness tool for adversarial simulation.

0
CustomProcessor Logo

CustomProcessor is a policy management tool that enables users to create and manage custom policies for IETF policy frameworks through a user-friendly interface.

0
CredMaster Logo

CredMaster enhances password spraying tactics with IP rotation to maintain anonymity and efficiency.

0
Silk Guardian Logo

An anti-forensic Linux Kernel Module kill-switch for USB ports.

0
AndroZoo Logo

A collection of Android Applications with malware analysis results

0
HASSH Logo

A Profiling Method for SSH Clients and Servers.

0
Open Backup Extractor Logo

Open Backup Extractor is an open source program for extracting data from iPhone and iPad backups.

0
Operator Handbook: Red Team + OSINT + Blue Team Reference Logo

A detailed manual for cybersecurity professionals focusing on red team, OSINT, and blue team strategies.

1
Mystikal Logo

A macOS Initial Access Payload Generator for penetration testing and red teaming exercises.

0
Certbot Logo

Certbot is a free tool for automatically enabling HTTPS on websites using Let's Encrypt certificates.

0
Webshell-Sniper Logo

A webshell manager via terminal for controlling web servers running PHP or MySQL.

0
Tcpreplay Logo

Tcpreplay is a network traffic editing and replay tool used for testing network devices and applications.

0
Zeek Analysis Tools (ZAT) Logo

ZAT is a Python package that processes and analyzes Zeek network security data using machine learning libraries like Pandas, scikit-learn, Kafka, and Spark.

0
Yara-Repo Logo

Collects Yara rules from over 150 free resources, a free alternative to Valhalla.

0
OWASP TOP 10 Presentation Logo

A presentation about the OWASP Top 10, a list of the most critical security risks to web applications.

0
Incident Response Techniques for Ransomware Attacks Logo

A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.

0
GitMiner Logo

A powerful tool for searching and scraping data from GitHub

0
Rexsser Logo

A Burp Suite plugin that extracts keywords from HTTP responses using regex patterns and tests for reflected XSS vulnerabilities within the target scope.

0
Shell-Storm Repository Logo

A repository of CTF challenges and resources from various cybersecurity competitions.

0
Kubernetes Goat Logo

Intentionally vulnerable Kubernetes cluster environment for learning and practicing Kubernetes security.

0