The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

DefaultCreds-cheat-sheet Logo

A centralized reference resource containing default credentials for various devices and systems to assist security professionals in both offensive and defensive operations.

0
RustScan Logo

Fast, smart, effective port scanner with extensive extendability and adaptive learning.

0
IOCextractor Logo

A program to extract IOCs from text files using regular expressions

0
Comodo Advanced Endpoint Protection Logo

Advanced Endpoint Protection is a complete endpoint protection platform that provides advanced threat protection against ransomware, data breaches, and malware.

0
CloudSploit by Aqua Logo

CloudSploit by Aqua is an open-source multi-cloud security scanning tool that detects security risks and compliance issues across AWS, Azure, GCP, OCI, and GitHub platforms.

0
AuditD on Android Logo

Porting GNU/Linux userland tools to the bionic/Linux userland of Android to provide access to the audit stream for Android applications with minimal overhead.

0
Recon Logo

A file search and query tool for ops and security experts.

0
Iptables Essentials Logo

Comprehensive guide for Iptables configuration and firewall rules.

0
SteelCon 2018 Logo

Cybersecurity conference featuring talks on various hacking topics by industry experts.

0
PLASMA Logo

PLASMA is an interactive disassembler that generates readable assembly code with colored syntax for reverse engineering binary files across multiple architectures and formats.

0
Labs-Pentest Logo

A comprehensive collection of free online laboratories and platforms for practicing penetration testing, CTF challenges, and cybersecurity skills development.

0
Tracy Logo

A tool for identifying potential security vulnerabilities in web applications

0
Key Vault Logo

Microsoft Azure service for safeguarding cryptographic keys and secrets.

0
AMT Honeypot Logo

A Go-based honeypot that mimics Intel's AMT management service to detect and log exploitation attempts targeting the CVE-2017-5689 firmware vulnerability.

0
Shadow Workers Logo

Shadow Workers is an open source C2 framework and proxy tool for penetration testers to exploit XSS vulnerabilities and malicious Service Workers.

0
FaPro Free Logo

A Fake Protocol Server tool with support for multiple network services and protocols.

0
altdns Logo

A tool for generating permutations, alterations and mutations of subdomains and resolving them

0
SourcePoint Logo

SourcePoint generates customizable C2 profiles for Cobalt Strike servers to enhance evasion capabilities against security defenses.

0
SUDO_KILLER Logo

A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.

0
Cuckoo Mod Logo

A modified version of Cuckoo Sandbox with enhanced features and capabilities.

0
Osquery Logo

Open-source tool for monitoring macOS hosts with detailed system activity insights.

0
pac-resolver Logo

Pac-resolver, a popular NPM package with 3 million weekly downloads, has a severe remote code execution flaw.

0
PhotoRec Logo

A free, open-source file data recovery software that can recover lost files from hard disks, CD-ROMs, and digital camera memory.

0
Abusing DCOM For Yet Another Lateral Movement Technique Logo

An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.

0