The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

go-audit Logo

An alternative to the auditd daemon with goals of safety, speed, JSON output, and pluggable pipelines connecting to the Linux kernel via netlink.

0
RDFP Logo

Zeek Remote desktop fingerprinting script for fingerprinting Remote Desktop clients.

0
PEDA Logo

PEDA is a Python extension for GDB that enhances debugging with colorized displays and specialized commands for exploit development and binary security analysis.

0
SOAR Logo

A Security Orchestration, Automation and Response (SOAR) platform for incident response and threat hunting.

0
RTIR Logo

Request Tracker for Incident Response (RTIR) is a tool for incident response teams to manage incident reports, correlate data, and facilitate communication.

0
0xf.at Hackits Logo

Solve password-riddles on a website without logins or ads.

0
Subra Logo

A simple web-based interface for subdomain enumeration using the subfinder tool.

0
NoSQL-Honeypot-Framework (NoPo) Logo

An open source honeypot for NoSQL databases with support for Redis and additional features for detecting attackers and logging attack incidents.

0
Enterprise Detection & Response: A Simple Hunting Maturity Model Logo

A simple maturity model for enterprise detection and response

0
Volexity Threat Intelligence Repository Logo

Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.

0
SharpShares Logo

SharpShares efficiently enumerates and maps network shares and resolves names within a domain.

0
Boomerang Decompiler Logo

An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.

0
Maltrail Logo

Maltrail is a malicious traffic detection system utilizing blacklists and heuristic mechanisms.

0
Reverse Engineering for Beginners Logo

A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.

0
FLARE-VM Logo

FLARE-VM is a Windows virtual machine setup tool that automates the installation and configuration of reverse engineering and malware analysis software using Chocolatey and Boxstarter technologies.

0
YARA-Signator Logo

Automatic YARA rule generation for malware repositories.

0
App Detonator Logo

A tool for dynamic analysis of mobile applications in a controlled environment.

0
PINCE Logo

PINCE is a front-end/reverse engineering tool for the GNU Project Debugger (GDB), focused on games, with CheatEngine-like value type support and memory searching capabilities.

0
iam-lint Logo

A GitHub action that lints AWS IAM policy documents to identify security issues and misconfigurations with configurable severity levels and custom rules.

0
YaYaGen Logo

Automatic YARA rule generator based on Koodous reports with limited false positives.

0
SOARCA Logo

SOARCA is an open-source SOAR platform that automates security incident response workflows using standardized CACAOv2 playbooks and multiple integration interfaces.

0
Papa Shango Logo

A Linux process injection tool that uses ptrace() to inject assembly-based shellcode into running processes without NULL byte restrictions.

0
FeatherDuster (and Cryptanalib) Logo

FeatherDuster is a cryptanalysis tool that automatically identifies and exploits weaknesses in cryptographic systems by analyzing ciphertext files.

0
DataPlane.org Logo

Dataplane.org is a nonprofit organization providing free data, tools, and analysis to increase awareness of Internet trends, anomalies, threats, and misconfigurations.

0