The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

@hapi/bourne Logo

JSON.parse() drop-in replacement with prototype poisoning protection.

0
WP-Smart-Honeypot Logo

WordPress plugin to reduce comment spam with a smarter honeypot.

0
dex2jar Logo

Tools for working with Android .dex and Java .class files, including dex-reader/writer, d2j-dex2jar, and smali/baksmali.

0
OWASP Amass Logo

Performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.

0
AWS Security Architectures Logo

A comprehensive AWS security automation toolkit that provides event monitoring, data protection, resource management, and security configuration validation across AWS environments.

0
Justniffer Logo

A network protocol analyzer for capturing and analyzing network traffic with a focus on TCP/IP flow reconstruction and response time tracking.

0
ExternalC2 Logo

A library for integrating communication channels with the Cobalt Strike External C2 server.

0
YaraGen Plugin for x64dbg Logo

Generate Yara rules from function basic blocks in x64dbg.

0
TerraGoat Logo

TerraGoat is a deliberately vulnerable Terraform repository that demonstrates common cloud infrastructure misconfigurations for training and testing security tools.

0
wireshark Logo

A free, open-source network protocol analyzer for capturing and displaying packet-level data.

0
ThreatHunting Logo

A Splunk app mapped to MITRE ATT&CK to guide threat hunts.

0
Dow Jones Hammer Logo

A multi-account AWS security tool that identifies misconfigurations, provides real-time reporting, and performs automated remediation to establish secure cloud guardrails.

0
IAM Zero Logo

IAM Zero detects identity and access management issues and automatically suggests least-privilege policies by analyzing application errors and access patterns in cloud environments.

0
OWASP AppSec Europe '16 Logo

The OWASP AppSec Europe '16 Conference is a leading gathering in web application security, featuring keynote speakers and in-depth trainings in application security topics.

0
Flan Logo

A vulnerability scanner that helps you identify and fix vulnerabilities in your code

0
Android App Security Checklist Logo

A security checklist based on OWASP standards that provides comprehensive guidelines for designing, testing, and releasing secure Android applications.

0
Hooker Logo

An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.

0
Evilginx2 Logo

A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.

0
Fail2ban Logo

Fail2ban is a daemon that automatically bans IP addresses showing malicious behavior by monitoring log files and updating firewall rules to prevent brute-force attacks.

0
Netlas Logo

Threat intelligence and digital risk protection platform

0
TANNER Logo

TANNER is a remote data analysis service that evaluates HTTP requests and generates responses for SNARE honeypots while emulating application vulnerabilities.

0
yaml2yara Logo

A tool for creating custom detection rules from YAML input

0
Binwalk Logo

Binwalk is a firmware analysis tool that enables reverse engineering and extraction of embedded file systems and archives from firmware images.

1
usbrip Logo

A command-line forensics tool for tracking and analyzing USB device artifacts and connection history on Linux systems.

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavantAI Logo

Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.

5
OSINTLeak Logo

OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

5
Mandos Brief Cybersecurity Newsletter Logo

Weekly cybersecurity newsletter for security leaders and professionals

5
View Popular Tools →