The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

Margarita Shotgun Logo

Margarita Shotgun is a Python tool that enables remote memory acquisition from target systems through command line interface, supporting Linux distributions and other operating systems via Docker containers.

0
GPG Sync Logo

GPG Sync is a tool designed to keep OpenPGP public keys up-to-date within an organization by offloading the complexity of key management to a single trusted person.

0
USBPcapOdinDumper Logo

A reverse engineering tool that extracts and organizes Samsung ODIN3 protocol messages from USB packet captures into human-readable files.

0
gpapi Logo

Node library for calling Google Play APIs with Nexus device behavior.

0
Viper Logo

A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.

0
YARALYZER Logo

A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.

0
Pacu Logo

Pacu is an open-source AWS exploitation framework designed for offensive security testing against cloud environments through modular attack capabilities.

0
UDcide Logo

UDcide is an Android malware analysis tool that detects and removes specific malicious behaviors from malware samples while preserving the binary for investigation purposes.

0
PayPal Donate Logo

Donate to your favorite open-source projects and charities using PayPal

0
The Practical Linux Hardening Guide Logo

A comprehensive guide providing step-by-step instructions for hardening GNU/Linux systems using industry standards like CIS, STIG, NIST, and PCI-DSS.

1
Naxsi Logo

NAXSI is a third-party nginx module that prevents XSS and SQL injection attacks by filtering HTTP traffic based on predefined security rules.

0
SWFTools Logo

SWFTools is a collection of utilities for working with Adobe Flash files, including tools for converting PDFs, images, audio, and video files to SWF format.

0
Two-Factor Authentication for SSH Login on Linux Logo

This tutorial describes how to set up two-factor authentication for an SSH server by integrating Google Authenticator with OpenSSH.

0
I-ISMS (Industrial Information Security Management System) Logo

A Microsoft Word template library for implementing industrial information security management systems with documentation for policy, risk management, business continuity, and incident handling.

0
jwt-hack Logo

A tool for hacking and security testing of JWT

0
libnids Logo

Libnids is an implementation of an E-component of Network Intrusion Detection System that emulates the IP stack of Linux 2.0.x and offers IP defragmentation, TCP stream assembly, and TCP port scan detection.

0
bundler-audit Logo

Patch-level verification tool for bundler to check for vulnerable gems and insecure sources.

0
Dissect Logo

Dissect is a digital forensics & incident response framework that simplifies the analysis of forensic artefacts from various disk and file formats.

0
oclhashcat Logo

Hashcat is a fast and advanced password recovery utility that supports various attack modes and hashing algorithms, and is open-source and community-driven.

0
NimPlant Logo

A lightweight Command and Control (C2) implant written in Nim that provides remote access capabilities for penetration testing and red team operations.

0
Exiv2 Logo

Exiv2 is a C++ library and command-line utility for reading, writing, deleting, and modifying Exif, IPTC, XMP, and ICC metadata in image files.

0
@hapi/crumb Logo

CSRF crumb generation and validation tool for hapi framework.

0
xssmap Logo

A Python-based tool for detecting XSS vulnerabilities

0
Axiom Logo

A dynamic multi-cloud infrastructure framework that enables rapid deployment of disposable instances pre-loaded with security tools for distributed offensive and defensive security operations.

0