The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

Glutton Setup Logo

Tool for setting up Glutton, a cybersecurity tool for monitoring SSH traffic.

0
github-search Logo

A collection of CLI tools and API utilities for searching and filtering GitHub repositories by various criteria including keywords, users, organizations, and repository attributes.

0
Gophish Logo

An open-source phishing toolkit for businesses and penetration testers.

0
dnSpy Logo

A .NET assembly debugger and editor that enables reverse engineering and dynamic analysis of compiled .NET applications without source code access.

0
WindowsExploits Logo

A collection of precompiled Windows exploits for privilege escalation.

0
CSO Online Logo

A leading online publication providing news, analysis, and insights on cybersecurity, IT leadership, and technology trends.

0
YaraScanner Logo

Microservice for scanning files with Yara

0
DeepBlueCLI Logo

A PowerShell module for threat hunting and security analysis through Windows Event Log processing and malicious activity detection.

0
RsaCtfTool Logo

A utility that attempts to decrypt data from weak RSA public keys and recover private keys using multiple integer factorization algorithms.

0
bro-intel-generator Logo

Generate Bro intel files from pdf or html reports.

0
SSHWATCH v2.0 Intrusion Prevention System (IPS) for Secure Shell (SSH) Logo

An intrusion prevention system for SSH that blocks IP addresses after a set number of consecutive failed login attempts.

0
Androguard Docker Image Logo

Docker file for building Androguard dependencies with an optional interactive shell environment.

0
PyIntelOwl Logo

PyIntelOwl is a Python SDK and CLI client for interacting with IntelOwl's threat intelligence API to submit files and observables for automated security analysis.

0
Red Teaming for Pacific Rim CCDC 2017 Logo

Participation in the Red Team for Pacific Rim CCDC 2017 with insights on infrastructure design and competition tips.

0
Splunk Attack Range Logo

An open-source platform that builds instrumented environments, simulates attacks, and integrates with Splunk for detection rule development and testing.

0
Twitter's Vine Source Code Dump Logo

A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.

0
KLara Logo

KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.

0
Sliver Logo

Adversary emulation framework for testing security measures in network environments.

0
ocaml-yara Logo

An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.

0
DroidRA Logo

DroidRA is an instrumentation-based Android security analysis tool that improves the accuracy of reflective call analysis through composite constant propagation techniques.

0
MISP Project Logo

MISP is an open source threat intelligence platform that enhances threat information sharing and analysis.

0
Resmo's Cybersecurity Blog Logo

Resmo's Cybersecurity Blog provides expert insights and tools for securing SaaS applications and cloud documents for IT and security teams.

0
T-Pot 17.10 Logo

Multi-honeypot platform with various honeypots and monitoring tools.

0
ffuf Logo

Fast web fuzzer written in Go

0