The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

Linux Expl0rer Logo

Easy-to-use live forensics toolbox for Linux endpoints with various capabilities such as process inspection, memory analysis, and YARA scanning.

0
Maldrolyzer Logo

A simple framework for extracting actionable data from Android malware

0
@fastify/rate-limit Logo

A low overhead rate limiter for your routes

0
Galah Logo

Galah is an LLM-powered web honeypot that mimics various web applications by dynamically responding to HTTP requests.

0
panic_bcast Logo

A decentralized network panic button that triggers emergency system shutdowns across networked machines via UDP broadcasts and HTTP to prevent cold boot attacks.

0
AWS Audit Manager Logo

Continually audit your AWS usage to simplify risk and compliance assessment.

0
MimiPenguin 2.0 Logo

A tool to dump login passwords from Linux desktop users, leveraging cleartext credentials in memory.

0
Docker Layer 2 ICC Bug Logo

A Docker security vulnerability where disabling inter-container communication (ICC) fails to block raw ethernet frames, allowing unexpected data transfer between containers via raw sockets.

0
GtkSourceView-YARA Logo

YARA syntax highlighting for Gtk-based text editors

0
MFT_Browser Logo

Recreates the File/Directory tree structure from an extracted $MFT file with detailed record mapping and analysis capabilities.

0
Linux Containers in 500 Lines of Code Logo

A project exploring minimal set of restrictions for running untrusted code using Linux containers in a concise codebase.

0
NightShade Logo

NightShade is a Django-based capture the flag framework that enables organizations to create and manage cybersecurity competitions with support for multiple contest formats and multi-tenant architecture.

0
Nuvola Logo

A cloud security analysis tool that creates digital twins of AWS environments using graph databases to identify attack paths and security misconfigurations through automated and manual rule-based assessments.

0
CloudFox Logo

CloudFox is an open source command line tool that helps penetration testers and offensive security professionals identify exploitable attack paths and gain situational awareness in cloud infrastructure environments.

0
StegCloak Logo

A JavaScript steganography module that hides encrypted secrets within text using invisible Unicode characters for covert communication across web platforms.

0
eScan Endpoint Security Logo

Comprehensive endpoint security solution for enterprise networks and SMBs

0
FullHunt Logo

FullHunt is a next-generation attack surface security platform that enables companies to discover, monitor, and secure their external attack surfaces.

0
Android port of Radamsa Logo

An Android port of the Radamsa fuzzing tool compiled with Android NDK to support Android ABIs for security testing on mobile platforms.

0
Wifislax Logo

GNU/Linux Wireless distribution for security testing with XFCE desktop environment.

0
The Matasano Crypto Challenges Logo

A set of 48 practical programming exercises in cryptography and application security

0
Infosec Resources Logo

Infosec Resources provides extensive cybersecurity training and certifications to boost cybersecurity skills and careers.

0
HoneyDB Logo

HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

0
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus Logo

A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.

0
GCPBucketBrute Logo

A script to enumerate Google Storage buckets and determine access and privilege escalation

0