Explore 2989 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
Want your tool featured here?
Get maximum visibility with pinned placement
A web-based manager for Yara rules, allowing for storage, editing, and management of Yara rules.
A web-based manager for Yara rules, allowing for storage, editing, and management of Yara rules.
A penetration testing tool for intercepting SSH connections and logging plaintext passwords.
A penetration testing tool for intercepting SSH connections and logging plaintext passwords.
Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.
Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.
A tool for extracting common indicators of compromise from a block of text.
A tool for extracting common indicators of compromise from a block of text.
A compilation of suggested tools for each component in a detection and response pipeline, with real-world examples, to design effective threat detection and response pipelines.
A compilation of suggested tools for each component in a detection and response pipeline, with real-world examples, to design effective threat detection and response pipelines.
A cross-platform security application that functions as a laptop kill cord, automatically locking or shutting down your computer when physically separated from you via a USB connection.
A cross-platform security application that functions as a laptop kill cord, automatically locking or shutting down your computer when physically separated from you via a USB connection.
A textmode sniffer for tracking tcp streams and capturing data in various modes.
A textmode sniffer for tracking tcp streams and capturing data in various modes.
Open Source Threat Intelligence Collector with plugin-oriented framework.
Open Source Threat Intelligence Collector with plugin-oriented framework.
A utility package that monitors hard drive health through SMART technology to detect and prevent disk failures before data loss occurs.
A utility package that monitors hard drive health through SMART technology to detect and prevent disk failures before data loss occurs.
Sophos Intercept X Endpoint is a comprehensive endpoint security solution that provides unparalleled protection against advanced attacks, ransomware, and data loss.
Sophos Intercept X Endpoint is a comprehensive endpoint security solution that provides unparalleled protection against advanced attacks, ransomware, and data loss.
Command-line password manager with GnuPG encryption and colorful interface.
Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.
Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.
Catalyst is a SOAR system that automates alert handling and incident response processes, adapting to your workflows and being open source.
Catalyst is a SOAR system that automates alert handling and incident response processes, adapting to your workflows and being open source.
LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.
LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.
JavaScript parser, minifier, compressor, and beautifier toolkit with simplified API and CLI.
JavaScript parser, minifier, compressor, and beautifier toolkit with simplified API and CLI.
Encrypt Kubernetes Secrets into SealedSecrets for safe storage and controlled decryption within the cluster.
Encrypt Kubernetes Secrets into SealedSecrets for safe storage and controlled decryption within the cluster.
SharpPrinter enables efficient discovery of network printers for security and management purposes.
SharpPrinter enables efficient discovery of network printers for security and management purposes.
Facilitates distribution of Threat Intelligence artifacts to defensive systems.
Facilitates distribution of Threat Intelligence artifacts to defensive systems.
Platform for hosting Jeopardy and 'King of the Hill' style Capture the Flag competitions.
Platform for hosting Jeopardy and 'King of the Hill' style Capture the Flag competitions.
PLCinject is a tool for injecting and patching blocks on PLCs with a call instruction.
PLCinject is a tool for injecting and patching blocks on PLCs with a call instruction.
Themis provides strong, usable cryptography for busy people.
VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.
VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.
Repository documenting common techniques to bypass AppLocker with verified, unverified, and generic bypasses.
Comprehensive digital forensics and incident response platform for law enforcement, corporate, and academic institutions.
Comprehensive digital forensics and incident response platform for law enforcement, corporate, and academic institutions.