Explore 2989 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
Want your tool featured here?
Get maximum visibility with pinned placement
A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts
A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts
iOS Mobile Backup Xtractor tool for extracting iOS backups.
Generates randomized C2 profiles for Cobalt Strike to evade detection.
Generates randomized C2 profiles for Cobalt Strike to evade detection.
Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.
Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.
A tool with advanced filtering capabilities for analyzing events based on time, path, weekday, and date.
A tool with advanced filtering capabilities for analyzing events based on time, path, weekday, and date.
Create checkpoint snapshots of the state of running pods for later off-line analysis.
Create checkpoint snapshots of the state of running pods for later off-line analysis.
DFIRTrack is an open source web application focused on incident response for handling major incidents with many affected systems, tracking system status, tasks, and artifacts.
DFIRTrack is an open source web application focused on incident response for handling major incidents with many affected systems, tracking system status, tasks, and artifacts.
A web security tool that scans for vulnerabilities and known attacks.
A web security tool that scans for vulnerabilities and known attacks.
A Ruby framework designed to aid in the penetration testing of WordPress systems.
A Ruby framework designed to aid in the penetration testing of WordPress systems.
A command-line tool for extracting detailed information from JPEG files, including image dimensions, compression, and metadata.
A command-line tool for extracting detailed information from JPEG files, including image dimensions, compression, and metadata.
CrowdStrike Falcon Orchestrator is a Windows-based application for workflow automation and security response.
CrowdStrike Falcon Orchestrator is a Windows-based application for workflow automation and security response.
A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.
A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.
Taxii2 server for interacting with taxii services.
Web interface for the Volatility Memory Analysis framework with advanced features.
Web interface for the Volatility Memory Analysis framework with advanced features.
Real-time, container-based file scanning system for threat hunting and incident response.
Real-time, container-based file scanning system for threat hunting and incident response.
Kiterunner is a tool for lightning-fast traditional content discovery and bruteforcing API endpoints in modern applications.
Kiterunner is a tool for lightning-fast traditional content discovery and bruteforcing API endpoints in modern applications.
A FTP honeypot tool for detecting and capturing malicious file upload attempts.
A FTP honeypot tool for detecting and capturing malicious file upload attempts.
Vim syntax-highlighting plugin for YARA rules with support up to v4.3.
Vim syntax-highlighting plugin for YARA rules with support up to v4.3.
Linux packet crafting tool for testing IDS/IPS and creating attack signatures.
Linux packet crafting tool for testing IDS/IPS and creating attack signatures.
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.
Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.
Detect off-instance key usage in AWS by analyzing CloudTrail files locally.
Detect off-instance key usage in AWS by analyzing CloudTrail files locally.
A honeypot trap for Symfony2 forms to reduce spam submissions.
A honeypot trap for Symfony2 forms to reduce spam submissions.
Hoarder is a tool to collect and parse windows artifacts.