The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

YARA Matches Correspondance Array (YMCA) Logo

Tool for visualizing correspondences between YARA ruleset and samples

0
pkgsign Logo

A CLI tool for signing and verifying npm and yarn packages.

0
SmaliHook Logo

Original SmaliHook Java source for Android cracking and reversing.

0
ThreatModel for Amazon S3 Logo

A comprehensive library documenting Amazon S3 attack scenarios and risk-based mitigation strategies for cloud storage security.

0
NomadBishop Logo

A C/C++ tool for remote process injection, supporting x64 and x86 operations, with system call macros generated by SysWhispers script.

0
Dependencies Logo

Dependencies is an open-source modern replacement for Dependency Walker that helps Windows developers analyze and troubleshoot DLL load dependency issues.

0
Raccoon Logo

Offensive security tool for reconnaissance and information gathering with a wide range of features and future roadmap.

0
stoQ Logo

A super-simple, modern framework for organizing and automating cybersecurity tasks.

0
Ghost USB Honeypot Logo

Ghost USB Honeypot emulates USB storage devices to detect and analyze malware that spreads via USB without requiring prior threat intelligence.

0
Best-practice-for-network-segmentation Logo

Best practices for corporate network segmentation to protect against basic targeted attacks

0
libfsapfs Logo

A library and tools to access and analyze APFS file systems

0
Adversary Emulation Library Logo

A library of adversary emulation plans to evaluate defensive capabilities against real-world threats.

0
IE10Analyzer Logo

IE10Analyzer can parse and recover records from WebCacheV01.dat, providing detailed information and conversion capabilities.

0
Dark Reading Logo

Dark Reading is a trusted online community for cybersecurity professionals, offering news, analysis, and insights on the latest cyber threats, technologies, and best practices.

2
GRFICS Logo

GRFICS is a Unity 3D-based framework that provides a virtual industrial control system environment for practicing ICS security attacks and defenses with visual feedback.

0
Drupot Logo

A honeypot installation for Drupal that supports Go modules and mimics different versions of Drupal.

0
AMExtractor Logo

AMExtractor is an Android memory acquisition tool that dumps physical device memory using /dev/kmem without requiring kernel source code.

0
Trend Micro Apex One Logo

Comprehensive cybersecurity platform for hybrid and multi-cloud environments

0
MiniCPS Logo

MiniCPS is a framework for real-time Cyber-Physical Systems simulation that supports physical process and control device simulation along with network emulation capabilities.

0
AbuseIO Logo

Open-source abuse management toolkit for automating and improving the abuse handling process.

0
LinuxKit Logo

LinuxKit is a toolkit for building custom minimal, immutable Linux distributions with secure defaults for running containerized applications like Docker and Kubernetes.

0
Echotrail Insights Logo

Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.

0
Ivy Logo

Ivy is a payload creation framework for executing arbitrary VBA source code directly in memory, utilizing programmatical access to load, decrypt, and execute shellcode.

0
Securibench Micro Logo

A collection of vulnerable web application test cases designed to benchmark and evaluate the effectiveness of static security analyzers and penetration testing tools.

0