The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

MCIR Logo

MCIR is a unified framework for building code injection vulnerability testbeds that combines SQL, XML, shell, and XSS injection testing tools with shared functionality and template-based extensibility.

0
Ghidra Software Reverse Engineering Framework Logo

Ghidra is an NSA-developed software reverse engineering framework that provides disassembly, decompilation, and analysis tools for examining compiled code across multiple platforms and processor architectures.

0
Turbinia Logo

Turbinia is an open-source framework for automating the running of common forensic processing tools to help with processing evidence in the Cloud.

0
Hash Extender Logo

Hash Extender is a command-line tool that automates length extension attacks against various hashing algorithms including MD5, SHA-1, SHA-256, and others.

0
Clevis Logo

Clevis is a pluggable framework that enables automated decryption of data and LUKS volumes through a pin-based plugin system.

0
PacBot Logo

PacBot is a cloud security platform that provides continuous compliance monitoring, automated policy enforcement, and security reporting through policy-as-code implementation and multi-source data integration.

0
Privilege Escalation Cheatsheet (Vulnhub) Logo

An educational cheatsheet that provides privilege escalation fundamentals and examples for CTF players and cybersecurity beginners.

2
Logdissect Logo

Logdissect is a CLI utility and Python library for analyzing log files and other data.

0
AWS Artifact Logo

On-demand access to AWS and ISV compliance reports with time-saving benefits.

0
USN-Journal-Parser Logo

Python script to parse the NTFS USN Change Journal.

0
Sophos AI YaraML Rules Repository Logo

A tool that generates Yara rules from training data using logistic regression and random forest classifiers.

0
Community Security Analytics (CSA) Logo

A community-driven repository of pre-built security analytics queries and rules for monitoring and detecting threats in Google Cloud environments across various log sources and activity types.

0
Antiope AWS Inventory & Compliance Framework Logo

An open-source framework that inventories and manages AWS resources across multiple accounts by collecting data via Cross Account Assume Roles and storing it in a centralized S3 bucket for analysis.

0
Azure DDoS Protection and Mitigation Services Logo

Azure DDoS Protection and Mitigation Services by Microsoft Azure for secure cloud solutions.

0
Secure Coding Guidelines for Java SE Logo

Guidelines for secure coding in Java SE to avoid bugs that could weaken security and open holes in Java's security features.

0
testssl.sh Logo

testssl.sh is a free command line tool for checking server's TLS/SSL configurations with clear and machine-readable output.

0
Boofuzz Logo

Boofuzz is a network protocol fuzzing tool that aims to fuzz everything

0
snync Logo

A security tool that detects potential Dependency Confusion attack vectors by identifying private package names that are not reserved on public registries.

0
OverTheWire: Vortex Logo

A wargame composed of 27 levels, with files needed in /vortex/ directory.

0
Fix Lockfile Integrity Logo

Reverts sha1 integrity back to sha512 in lock files for enhanced security.

0
Windows Secure Host Baseline Logo

Automated and flexible approach for deploying Windows 10 with security standards set by the DoD.

0
Sniff Logo

Makes output from the tcpdump program easier to read and parse.

0
ThreatTracker Logo

An IOC tracker written in Python that queries Google Custom Search Engines for various cybersecurity indicators and monitors domain status using Google Safe Browsing APIs.

0
S3 Exif Cleaner Logo

A tool that removes Exif metadata from images stored in AWS S3 buckets to protect privacy and eliminate sensitive embedded information.

0