The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

DumpsterFire Toolset Logo

A modular, cross-platform framework for creating repeatable, time-delayed security events and scenarios for Blue Team training and Red Team operations.

0
SANS Blog Logo

SANS Blog provides extensive cybersecurity training and certifications tailored to a wide range of IT security areas and skill levels.

0
cloud-nuke Logo

A CLI tool for bulk deletion and inspection of AWS resources to clean up testing accounts and prevent unnecessary charges.

0
StrutsHoneypot Logo

An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.

0
Mirai Tracker Logo

A tracker that detects and logs SYN packets with a specific signature generated by the Mirai malware, providing real-time information on Mirai-based campaigns.

0
T-Pot - The All In One Multi Honeypot Platform Logo

A multiarch honeypot platform supporting 20+ honeypots and offering visualization options and security tools.

0
clj-net-pcap Logo

A wrapper around jNetPcap for packet capturing with Clojure, available for Linux and Windows.

0
Security Intelligence Logo

Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

0
JS NICE Logo

Statistical renaming, Type inference, and Deobfuscation tool for JavaScript code.

0
Bro IDS Logo

An open-source network security monitoring tool.

0
MadKing Amazon Web Services Attack Platform Logo

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

0
Firezone Logo

An open source platform for secure remote access management with granular access control

0
FortiEDR Logo

FortiEDR is an automated endpoint security solution that integrates with the Fortinet Security Fabric and third-party solutions to reduce MTTR and provide real-time breach detection and response.

-1
Check Point Endpoint Security Logo

A robust endpoint security solution that offers data security, network security, and advanced threat prevention, all managed from a single console to protect your devices and data.

0
Acunetix Vulnerability Scanner Logo

A comprehensive web application security testing solution that offers built-in vulnerability assessment and management, as well as integration options with popular software development tools.

0
SQL Injection Cheat Sheet Logo

A comprehensive SQL injection cheat sheet covering various database management systems and techniques.

0
FEX Imager™ Logo

Forensic imaging program with full hash authentication and various acquisition options.

0
PowerGRR Logo

PowerGRR is a PowerShell API client library that automates GRR (Google Rapid Response) operations for digital forensics and incident response across multiple operating systems.

0
Google Security Operations Detection Rules Logo

Sample detection rules and dashboards for Google Security Operations

0
Havoc Logo

Havoc is a malleable post-exploitation command and control framework that provides a client-server architecture with payload generation, customizable C2 profiles, and team collaboration capabilities for red team operations.

0
Oriana Logo

Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.

0
Binkit Logo

Binkit is a binary analysis tool that merged with DarunGrim and incorporates its analysis algorithms, currently in internal testing before official release.

0
Vulnerable-AD Logo

Create a vulnerable active directory for testing various Active Directory attacks.

0
Amazon GuardDuty Tester Logo

A collection of scripts and guidance for generating proof-of-concept Amazon GuardDuty findings to help users understand and test AWS security detection capabilities.

0