The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

Pair Domains Logo

Domain registration and web hosting services with free features and 24/7 customer support

0
ZeusCloud Logo

ZeusCloud is an open source cloud security platform that discovers AWS assets, identifies attack paths, and provides remediation guidance with customizable compliance controls.

0
InlineWhispers Logo

A tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) for offensive security purposes.

0
Binary Exploitation Tutorial Logo

Comprehensive tutorial on modern exploitation techniques with a focus on understanding exploitation from scratch.

0
3GL Logo

3GL is a high-level programming language with a focus on ASM for 6502.

0
yarAnalyzer Logo

yarAnalyzer creates statistics on a yara rule set and files in a sample directory, generating tables and CSV files, including an inventory feature.

0
ClamAV Logo

ClamAV is an open-source antivirus engine that detects trojans, viruses, malware, and other malicious threats.

0
Windows Privilege Escalation Techniques Logo

A list of Windows privilege escalation techniques, categorized and explained in detail.

0
HTB Academy Logo

HTB Academy offers guided cybersecurity training with industry certifications to help you become a market-ready professional.

1
AWS WAF Logo

AWS Web Application Firewall (WAF) for protecting web applications from common exploits.

0
MushMush Foundation Logo

Non-profit organization supporting the advancement of open source software.

0
RedHunt Linux Distribution (VM) v2 Logo

A Linux distribution designed for threat emulation and threat hunting, integrating attacker and defender tools for identifying threats in your environment.

0
tiq-test Logo

A data visualization and statistical analysis tool for measuring the quality and effectiveness of threat intelligence indicator feeds through various analytical tests.

0
Event Query Language (EQL) Logo

Browse a library of EQL analytics now natively integrated in Elasticsearch.

0
Shellclear Logo

A command-line tool that secures shell command history by clearing sensitive commands, displaying command summaries, and providing stash functionality for presentations across multiple shell environments.

0
BadCyber Logo

A curated list of important security news, helping readers stay up-to-date with the latest developments in cybersecurity.

0
Zircolite Logo

Standalone SIGMA-based detection tool for EVTX, Auditd, Sysmon for Linux, XML or JSONL/NDJSON Logs.

0
Incident Response Investigation System (IRIS) Logo

A web collaborative platform for incident responders to share technical details during investigations, shipped in Docker containers for easy installation and upgrades.

0
Mellivora Mellivora Logo

Mellivora Mellivora is a PHP-based CTF engine that provides comprehensive competition hosting capabilities with challenge management, team scoring, and administrative tools for cybersecurity competitions.

0
AppUse Logo

A VM for mobile application security testing, Android and iOS applications, with custom-made tools and scripts.

0
Dirty COW Logo

A local privilege escalation vulnerability in the Linux kernel known for its catchy name and potential damages.

0
Scumblr Logo

Scumblr is a web-based security automation platform that performs periodic data source synchronization and security analysis to help organizations proactively identify and track security issues.

0
AWS Security Toolbox (AST) Logo

A Docker container that bundles preinstalled AWS security tools for streamlined security operations and assessments in AWS environments.

0
ssh-auth-logger Logo

A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.

0